engaging-computing / phpSENSE

An educational data analytics platform.
http://isenseproject.org
14 stars 10 forks source link

fully exploitable sqli in /ws/highdata.php (and perhaps others) #510

Open ghost opened 11 years ago

ghost commented 11 years ago

Noticed from the sql errors displayed in issue #504 (url with the empty sessions parameter) that the /ws/highdata.php 'vid' and 'sessions' parameters are not handled safely.

This would appear to be an issue with the way sanitizer.php handles things, as that code /should/ be working - which means other things may very well have the same issue.

Edit(0): confirmed that at least newvis.php suffers from what appears at first glance to be the same issue. Edit(1): confirmed upload.php's "id" parameter is injectable. the google_key param should also be vulnerable.

For motivation:

root:x:0:0:root:/root:/bin/bash
...
mmcguinn:x:1001:1001::/home/mmcguinn:/bin/bash
isense:x:1002:1002:isense,,,:/home/isense:/bin/bash
jdalphon:x:1003:1003:James,Dalphond,,:/home/jdalphon:/bin/bash
...