|
Family: CGI abuses --> Category: attack
Pixelpost category Parameter SQL Injection Vulnerability Vulnerability Scan
Vulnerability Scan Summary Tries to exploit SQL injection issue in Pixelpost
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote web server contains a PHP script that is prone to SQL
injection attacks.
Description :
The remote host is running Pixelpost, a photo blog application based
on PHP and MySQL.
The version of Pixelpost installed on the remote fails to sanitize
user-supplied input to the 'category' parameter of the 'index.php'
script before using it to construct database queries. Provided PHP's
'magic_quotes_gpc' setting is disabled, an unauthenticated attacker
can exploit this flaw to manipulate database queries and, for example,
uncover the administrator's username and password hash, which can
later be used to gain administrative access to the affected
application.
In addition, Pixelpost reportedly suffers from a similar issue
involving the 'archivedate' parameter of the 'index.php' script.
See also :
http://www.securityfocus.com/archive/1/435856/30/60/threaded
http://forum.pixelpost.org/showthread.php?t=4331
Solution :
Apply the patches listed in the vendor forum post referenced above.
Threat Level:
Medium / CVSS Base Score : 5.6
(AV:R/AC:H/Au:NR/C:P/I:P/A:P/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|