1
despite being called and belittled by xtorrent author wishcraft, and his statement that I am being paranoid and don't know what i'm talking about.
Xtorrent module is vulnerable to SQL injection.
and yes i do know what $_GET & $HTTP_GET_VARS are.. long vars are deprecated btw ;)
viewcat.php is vulnerable to injection because input is not correctly sanitized.
I'm not a drama queen like wishcraft.
you try to offer advice & you get met with hostility.. why should anyone bother reporting security vulnerabilities instead of just hacking you all the time.
proof of concept >
http://www.domain.com/modules/xtorrent/viewcat.php?cid=999%20un_ion%20select%20uname,null,null,null,null,null%20from%20xoops_users%20where%20uid=1
the above will display the username of uid =1 when u type that into the address bar by injecting sql into viewcat.
the mere fact that you get a result means the module is vulnerable. usernae is not the only thing that can be grabbed, password hashes or anything from any table can easily be retrieved by crafting a url similar to above or even more so when using concat().
now wishcraft please tell me i'm being paranoid.
ps. remove the _ underscore from un_ion
also that is just 1 exploit, there are more files and more $variables etc that can be exploited in the module.