Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: CGI abuses --> Category: attack

Cerberus Support Center Multiple Vulnerabilities Vulnerability Scan


Vulnerability Scan Summary
Checks for multiple vulnerabilities in Cerberus Support Center

Detailed Explanation for this Vulnerability Test

Synopsis :

The remote web server has a PHP application that is affected by SQL
injection and cross-site scripting flaws.

Description :

The remote host is running Cerberus Support Center, a customer support
portal written in PHP.

The installed version of Cerberus Support Center is affected by a
cross-site scripting flaw due to its failure to sanitize input to the
'kb_ask' parameter of the 'index.php' script before using it in
dynamically-generated web pages. In addition, it reportedly fails to
sanitize input to the the 'file_id' parameter of the
'attachment_send.php' script before it in database queries.

Exploitation of the SQL injection vulnerability requires that an
attacker first authenticate while the cross-site scripting issue may
be possible without authentication, depending on the application's
configuration.

See also :

http://lists.grok.org.uk/pipermail/full-disclosure/2005-December/040324.html
http://www.cerberusweb.com/devblog/?p=56
http://forum.cerberusweb.com/showthread.php?s=&postid=30315

Solution :

Upgrade to Cerberus Support Center 3.2.0pr2 and edit
'attachment_send.php' as described in the forum post referenced above.
Note that this does not, though, fix the cross-site scripting issue.

Threat Level:

High / CVSS Base Score : 7.0
(AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N)

Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.