Family: CGI abuses --> Category: attack
Cerberus Support Center Multiple Vulnerabilities Vulnerability Scan
Vulnerability Scan Summary
Checks for multiple vulnerabilities in Cerberus Support Center
Detailed Explanation for this Vulnerability Test
The remote web server has a PHP application that is affected by SQL
injection and cross-site scripting flaws.
The remote host is running Cerberus Support Center, a customer support
portal written in PHP.
The installed version of Cerberus Support Center is affected by a
cross-site scripting flaw due to its failure to sanitize input to the
'kb_ask' parameter of the 'index.php' script before using it in
dynamically-generated web pages. In addition, it reportedly fails to
sanitize input to the the 'file_id' parameter of the
'attachment_send.php' script before it in database queries.
Exploitation of the SQL injection vulnerability requires that an
attacker first authenticate while the cross-site scripting issue may
be possible without authentication, depending on the application's
See also :
Upgrade to Cerberus Support Center 3.2.0pr2 and edit
'attachment_send.php' as described in the forum post referenced above.
Note that this does not, though, fix the cross-site scripting issue.
High / CVSS Base Score : 7.0
Click HERE for more information and discussions on this network vulnerability scan.