[VIM] Errors and oddities in Phorum 5.0.11 XSS/SQl injection
    Steven M. Christey 
    coley at mitre.org
       
    Fri Jul 15 17:25:06 EDT 2005
    
    
  
CVE's forthcoming.
OSVDB:11129 read.php SQL injection
SECUNIA:12980 - generic XSS and SQL injection
BID:11538 - generic XSS and SQL injection
SECTRACK:1011921 -  read.php SQL injection and XSS
Looks like every VDB has a different spin on the details.
Here's my take:
- Positive Technologies releases report on SQL injection in read.php
  query string for Phorum 5.0.11
  MISC:http://www.maxpatrol.com/advdetails.asp?id=15
  MISC:http://www.maxpatrol.com/mp_advisory.asp
  Researcher claims issue is fixed in CVS.
- Phorum releases 5.0.12.  Changelog says "XSS really gone now" and
  "two instances of "fixed sql-injection issue"
  http://phorum.org/changelog-5.txt
  Not enough detail for me to be sure they fixed the SQL injection
  issue.
- I search through CVS to try and find relevant diffs, but give up
  after a few minutes.
- CVS changelog is more informative:
   http://phorum.org/cvs-changelog-5.txt
  * shows SQL injection in read.php *AND* file.php
  * lists XSS is in search.php
  For CVE, "mutual consistency" of researcher ("fixed in CVS") and
  vendor (fixed associated file in next version) is sufficient for
  acknowledgement of the read.php issue.
Somewhere along the line:
  - VDB's linked the XSS to Positive Technologies - but they never
    report XSS
  - some VDB's only had the vendor changelog and so didn't know it was
    readphp
  - all/most VDB's missed that there are 2 SQL injections, one for
    read.php and one for file.php
  - some VDB's said the XSS was for read.php but there's no evidence
    of it.
- Steve
    
    
More information about the VIM
mailing list