Several vulnerabilities in Mapbender map software
The Mapbender map application contains several vulnerabilities that can be exploited to examine the database contents and manipulate them or to take control of the server. The software is a geodata collection server using a web service interface to the Open Geospatial Consortium (OGC) standard. Inadequate filtering of user parameters in the
mapFiler.php script makes it possible to write arbitrary PHP scripts in a file on the server and execute them.
Security services provider RedTeam Pentesting describes a demo exploit in its vulnerability report. RedTeam also found SQL injection holes in several Mapbender scripts which allow user names and the corresponding password hashes to be read. The errors occur in version 2.4.4. Previous versions are also likely to contain them. Updating to version 2.4.5 RC1 (ZIP file) should remedy the problem, although the changelog that accompanies the update makes no reference to any possible security problems.
- Remote Command Execution in Mapbender, error report by RedTeam Pentesting
- SQL Injections in Mapbender, error report by RedTeam Pentesting