|
Family: CGI abuses --> Category: attack
Cerberus Support Center Multiple Vulnerabilities Vulnerability Scan
Vulnerability Scan Summary Checks for multiple vulnerabilities in Cerberus Support Center
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote web server has a PHP application that is affected by SQL
injection and cross-site scripting flaws.
Description :
The remote host is running Cerberus Support Center, a customer support
portal written in PHP.
The installed version of Cerberus Support Center is affected by a
cross-site scripting flaw due to its failure to sanitize input to the
'kb_ask' parameter of the 'index.php' script before using it in
dynamically-generated web pages. In addition, it reportedly fails to
sanitize input to the the 'file_id' parameter of the
'attachment_send.php' script before it in database queries.
Exploitation of the SQL injection vulnerability requires that an
attacker first authenticate while the cross-site scripting issue may
be possible without authentication, depending on the application's
configuration.
See also :
http://lists.grok.org.uk/pipermail/full-disclosure/2005-December/040324.html
http://www.cerberusweb.com/devblog/?p=56
http://forum.cerberusweb.com/showthread.php?s=&postid=30315
Solution :
Upgrade to Cerberus Support Center 3.2.0pr2 and edit
'attachment_send.php' as described in the forum post referenced above.
Note that this does not, though, fix the cross-site scripting issue.
Threat Level:
High / CVSS Base Score : 7.0
(AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|