|
Family: CGI abuses --> Category: attack
phpWebSite Search Module SQL Injection Vulnerability Vulnerability Scan
Vulnerability Scan Summary Detects search module SQL injection vulnerability in phpWebSite
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote web server contains a PHP script that is prone to SQL
injection attacks.
Description :
The remote host is running a version of phpWebSite that fails to
sanitize user-supplied input to the 'module' parameter of the 'search'
module before using it in database queries. A possible hacker may be able to
exploit this issue to obtain sensitive information such as user names
and password hashes or to launch attacks against the database.
See also :
http://sourceforge.net/mailarchive/forum.php?thread_id=8540340&forum_id=34704
http://lists.grok.org.uk/pipermail/full-disclosure/2005-October/037936.html
http://www.phpwebsite.appstate.edu/index.php?module=announce&ANN_user_op=view&ANN_id=1034
Solution :
Apply the security patch referenced in the vendor's advisory or upgrade
to phpWebSite 0.10.2 or later.
Threat Level:
High / CVSS Base Score : 7.0
(AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|