Family: CGI abuses --> Category: attack
Gravity Board X <= 1.1 Multiple Vulnerabilities Vulnerability Scan
Vulnerability Scan Summary
Checks for multiple vulnerabilities in Gravity Board X <= 1.1
Detailed Explanation for this Vulnerability Test
The remote web server contains a PHP application that is affected by
The remote host is running Gravity Board X, an open-source, web-based
electronic forum written in PHP.
The version of Gravity Board X installed on the remote host suffers
from several flaws, including :
- Unauthorized Access Vulnerability
The 'editcss.php' script does not require authentication
before writing user-supplied input to template files. By
exploiting this flaw, a possible hacker may be able to deface
the affected site or run arbitrary PHP code (see below).
- SQL Injection Vulnerability
The application does not sanitize user-supplied input to
the 'email' parameter of the 'index.php' script before
using it in database queries. By exploiting this flaw,
a possible hacker can bypass authentication and possibly
disclose or modify data or launch attacks against the
- Arbitrary PHP Code Execution Vulnerability
Using either of the two previous flaws, a possible hacker
can inject arbitrary PHP code into template files,
which will then be executed on the remote host within
the context of the web server userid with each page
See also :
Unknown at this time.
High / CVSS Base Score : 7
Click HERE for more information and discussions on this network vulnerability scan.