|
Family: CGI abuses --> Category: attack
Multiple Vulnerabilities in PostNuke <= 0.760 RC4b Vulnerability Scan
Vulnerability Scan Summary Detects multiple vulnerabilities in PostNuke <= 0.760 RC4b
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote web server contains a PHP script that is prone to several
attacks.
Description :
The remote host appears to be running PostNuke version 0.760 RC4b or
older. These versions suffer from several vulnerabilities :
- Multiple Cross-Site Scripting Vulnerabilities
A possible hacker can inject arbitrary HTML and script
code into the browser of users by manipulating
input to the 'moderate' parameter of the
'Comments' module and the 'htmltext' parameter
of the 'user.php' script.
- A SQL Injection Vulnerability
The application fails to launder user-supplied
input to the 'show' parameter in the
'modules/Downloads/dl-viewdownload.php' module.
Provided a possible hacker has admin rights, he can
exploit this issue to manipulate SQL queries.
See also :
http://securityreason.com/achievement_securityalert/22
http://archives.neohapsis.com/archives/bugtraq/2005-08/0288.html
Solution :
Upgrade to PostNuke version 0.760 or later.
Threat Level:
Low / CVSS Base Score : 2
(AV:R/AC:H/Au:R/C:P/A:N/I:P/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|