You are here

U-195: PHPlist Input Validation Flaws Permit Cross-Site Scripting and SQL Injection Attacks

June 20, 2012 - 7:00am

Addthis

PROBLEM:

Two vulnerabilities were reported in PHPlist. A remote user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands.

PLATFORM:

Version(s): prior to 2.10.18

ABSTRACT:

The 'public_html/lists/admin' pages do not properly validate user-supplied input in the 'sortby' parameter [CVE-2012-2740]. A remote authenticated administrative user can supply a specially crafted parameter value to execute SQL commands on the underlying database.

REFERENCE LINKS:

Vendor Advisory
Security Tracker ID 1027181
CVE-2012-2740, CVE-2012-2741

IMPACT ASSESSMENT:

Medium

Discussion:

The 'public_html/lists/admin' pages do not properly filter HTML code from user-supplied input in the 'num' parameter before displaying the input [CVE-2012-2741]. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the PHPlist software and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user..

Impact:

A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the PHPlist software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

Solution:

The vendor has issued a fix (2.10.18).

Addthis