-SMD
Put your site @http://www.xoops-topsites.com
// paranoid sanitization -- only let the alphanumeric set through
$str_list = isset($_GET['list']) ? $_GET['list'] : 0;
$list = preg_replace("/[^a-zA-Z0-9]/", "", $str_list);
$sql .= "WHERE title LIKE '" . [color=ff0000][b]$list[/b][/color] . "%' AND published > 0 AND
published <= " . time() . " AND (expired = 0 OR expired > " . time() . ") AND offline = 0
ORDER BY " . $orderby;
Secunia Advisory: SA17573
Release Date: 2005-11-15
Critical:
Moderately critical
Impact: Exposure of sensitive information
Where: From remote
Solution Status: Unpatched
Software: Xoops 2.x
Select a product and view a complete list of all Patched/Unpatched Secunia advisories affecting it.
Description:
rgod has discovered a vulnerability in Xoops, which can be exploited by malicious people to disclose sensitive information.
Input passed to the "xoopsConfig[language]" parameter in "class/xoopseditor/textarea/editor_registry.php" isn't properly verified, before it is used to include files. This can be exploited to include arbitrary files from local resources.
Successful exploitation requires that "register_globals" is enabled and that "magic_quotes_gpc" is disabled.
The vulnerability has been confirmed in version 2.2.3. Other versions may also be affected.
Solution:
Edit the source code to ensure that input is properly verified.
Set "register_globals" to "Off".
Provided and/or discovered by:
rgod
Please note: The information, which this Secunia Advisory is based upon, comes from third party unless stated otherwise.
Secunia collects, validates, and verifies all vulnerability reports issued by security research groups, vendors, and others.
Secunia Advisory: SA17575
Release Date: 2005-11-15
Critical:
Moderately critical
Impact: Manipulation of data
Where: From remote
Solution Status:
Unpatched
Software: WF-Downloads 2.x (module for Xoops)
Select a product and view a complete list of all Patched/Unpatched Secunia advisories affecting it.
Description:
rgod has reported a vulnerability in the WF-Downloads module for Xoops, which can be exploited by malicious people to conduct SQL injection attacks.
Input passed to the "list" parameter in "viewcat.php" isn't properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
Successful exploitation requires that "magic_quotes_gpc" is disabled.
The vulnerability has been reported in version 2.05. Other versions may also be affected.
Solution:
Edit the source code to ensure that input is properly sanitised.
Provided and/or discovered by:
rgod
Please note: The information, which this Secunia Advisory is based upon, comes from third party unless stated otherwise.
Secunia collects, validates, and verifies all vulnerability reports issued by security research groups, vendors, and others.
Kaspersky wrote:
Warning Modules wear
irtibat Modules
Userpoint
statistics
Wear