FactoSystem CMS Contains Multiple Vulnerabilities
Impact: Multiple vulnerabilities -- all allowing
manipulation of the backend database
Risk: High
Class: Input Validation Error
Affected System: IIS 4.0 or later with ASP enabled and
FactoSystem CMS installed
Description
Multiple SQL injection vulnerabilities exist in the
FactoSystem Content Management System that may allow an
attacker to introduce instructions into an SQL query.
The vulnerabilities exist because the script fails to
verify the validity of numeric data or fails to
properly escape certain control characters in strings.
The problems are in the handling of the query variables
"authornumber" (in author.asp), and "discussblurbid"
(in discuss.asp), and the form variables "name" and
"email" (in holdcomment.asp). An example is below:
Logged In: YES
user_id=215971
These will be fixed in the next release.