Research > Zero-Day Tracker > 20130611
Fobuc Guestbook SQL Injection Vulnerability
Patch Not Yet Available
Fobuc Guestbook 0.9 and earlier versions
The Fobuc Guestbook contains a vulnerability caused by the "category" parameter in GET requests sent to index.php, which is later used in a SQL query. If properly leveraged, this vulnerability may allow a remote attacker to inject SQL commands into a target database.
A remote attacker is able to insert SQL commands into the value of the "category" parameter in a query, allowing an attacker to query the database and possibly gain access to sensitive information. This may be leveraged to gain access to other sensitive components of a website or publicly facing infrastructure.
No mitigation is currently available.
BeyondTrust's Retina® Network Security Scanner scans devices to detect for this vulnerability.
19304 - Fobuc Guestbook SQL Injection Vulnerability (20130612) (Zero-Day)
2013-06-11 - Original disclosure.
Copyright ©1998-2011 eEye Digital Security
Permission is hereby granted for the redistribution of this alert electronically. It is not to be edited in any way without express consent of eEye. If you wish to reprint the whole or any part of this alert in any other medium excluding electronic medium, please email alert@eEye.com for permission.
The information within this paper may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are no warranties, implied or express, with regard to this information. In no event shall the author be liable for any direct or indirect damages whatsoever arising out of or in connection with the use or spread of this information. Any use of this information is at the user's own risk.