ExpressionEngine CMS
Open, Free, Amazing

Thread

This is an archived forum and the content is probably no longer relevant, but is provided here for posterity.

The active forums are here.

PHP Code Injection Vunerability

September 13, 2010 7:01pm

Subscribe [3]
  • #1 / Sep 13, 2010 7:01pm

    mklann

    14 posts

    Hey all, I recently ran McAfee site scan on a clients website and there appears to be a MAJOR hole in EE. It returned a PHP Code Injection vulnerability on the following form: /member/memberlist/

    [[Mod Edit: Removed code]]

    Our client is running EE 1.6.8, I would upgrade but I don’t see any reference to a fix for this in 1.6.9 change logs.

  • #2 / Sep 13, 2010 7:19pm

    Lisa Wess

    20502 posts

    Thank you for the report.  I have brought your post to the attention of our team to assess this.

    I would recommend updating to 1.6.9 as well.

    Thank you.

  • #3 / Sep 13, 2010 7:32pm

    mklann

    14 posts

    Thanks for the quick response. The problem lies in the pagination links at the bottom of the page. In my initial research it appears to be the $first_letter variable being sent to the Pagination class, line 604 of member_memberlist.php. But I cannot find where its getting the $_POST values. Hope that helps in troublshooting.

  • #4 / Sep 14, 2010 3:31pm

    Ingmar

    29245 posts

    Thanks. As Lisa said, our devs are looking into this.

  • #5 / Sep 21, 2010 4:00pm

    mklann

    14 posts

    Any update? This is a serious security issue that we need to get patched. Thanks.

  • #6 / Sep 21, 2010 6:16pm

    Derek Jones

    7561 posts

    Sorry for not getting back to you mklann.  While there was the potential to trigger a MySQL error, your demonstrated attack cannot result in SQL injection, nor script injection.

    Member templates do not parse PHP unless you have hacked your installation to do so, and ExpressionEngine is not responsible for vulnerabilities created by such modifications.  I’m not sure what McAfee reported, but the result of what you submitted on an unmodified installation would break the pagination links for the user who tried to inject code, and nothing more.

    Nevertheless, your report was greatly appreciated and did directly contribute to making ExpressionEngine better, so we thank you.

  • #7 / Sep 21, 2010 7:02pm

    Derek Jones

    7561 posts

    Received your updated post, mklann, thank you.  Our fix does address this, but you are indeed correct, thanks for the specifics.

  • #8 / Sep 21, 2010 7:12pm

    mklann

    14 posts

    Derek, when is the fix going to be released? We are using EE 1.6.9, can you guys please release a security update?

  • #9 / Sep 21, 2010 7:33pm

    Derek Jones

    7561 posts

    mklann, please check the email associated with your ExpressionEngine.com account.

.(JavaScript must be enabled to view this email address)

ExpressionEngine News!

#eecms, #events, #releases