Pointter PHP Content Management System Multiple
Pointter PHP Content Management System Multiple Vulnerabilities
Release Date : 2011-03-17
Criticality level : Moderately critical
Impact : Cross Site Scripting
Manipulation of data
Where : From remote
Solution Status : Unpatched
Software: Pointter PHP Content Management System 1.x
Gjoko Krstic has discovered multiple vulnerabilities in Pointter PHP Content Management System, which can be exploited by malicious people to conduct script insertion and SQL injection attacks.
1) Input passed via the "category" parameter to admin/functions/createcategory.php is not properly sanitised before being displayed to the user. This can be exploited to insert HTML and script code, which will be executed in a user's browser session in context of the affected site when the malicious data is viewed.
2) Input passed via the "onoff", "pos", "count", "boxname", "tonoff", "tpos", "tname", "monoff", "mpos", "mname", "nonoff", "npos", "nname", "memonoff", "mempos", "memname", "searchonoff", "searchname", and "mail" parameters to admin/functions/editsettings.php is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
Successful exploitation of this vulnerability requires that "magic_quotes_gpc" is disabled.
NOTE: Some issues, which can overwrite arbitrary files within the webroot and render the application unusable have also been reported.
The vulnerabilities are confirmed in version 1.2. Other versions may also be affected.
Edit the source code to ensure that input is properly verified and sanitised.
Provided and/or discovered by:
Gjoko 'LiquidWorm' Krstic
Zero Science Lab:
Was this reply helpful? (0) (0)