---------------------------------------------------------------------- Hardcore Disassembler / Reverse Engineer Wanted! Want to work with IDA and BinDiff? Want to write PoC's and Exploits? Your nationality is not important. We will get you a work permit, find an apartment, and offer a relocation compensation package. http://secunia.com/hardcore_disassembler_and_reverse_engineer/ ---------------------------------------------------------------------- TITLE: Netious CMS SQL Injection and Session Hijacking SECUNIA ADVISORY ID: SA21347 VERIFY ADVISORY: http://secunia.com/advisories/21347/ CRITICAL: Moderately critical IMPACT: Hijacking, Security Bypass, Manipulation of data WHERE: >From remote SOFTWARE: Netious CMS 0.x http://secunia.com/product/11241/ DESCRIPTION: Jacek Wlodarczyk has discovered two vulnerabilities in Netious CMS, which can be exploited by malicious people to hijack user sessions and conduct SQL injection attacks. 1) Input passed to the "username" parameter during login isn't properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Successful exploitation requires that "magic_quotes_gpc" is disabled. 2) An error in the session management caused due to the session ID being initialised based on the user's IP address can be exploited to access the administration section. Successful exploitation requires that the administrative user and attacker share the same IP address and that the administrator is currently logged in. The vulnerabilities have been confirmed in version 0.4. Other versions may also be affected. SOLUTION: Edit the source code to ensure that input is properly sanitised and that users are properly authenticated. PROVIDED AND/OR DISCOVERED BY: Jacek Wlodarczyk ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------