|
Family: CGI abuses --> Category: attack
Scout Portal Toolkit forumid Parameter SQL Injection Vulnerability Vulnerability Scan
Vulnerability Scan Summary Checks for forumid parameter SQL injection in Scount Portal Toolkit
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote web server contains a PHP script that is susceptible to a
SQL injection attack.
Description :
The remote host is running Scout Portal Toolkit, an open-source
toolkit for organizing collections of online resources / knowledge.
The version of Scout Portal Toolkit installed on the remote host fails
to sanitize user-supplied input to the 'forumid' parameter to the
'SPT--ForumTopics.php' script before using it in a database query.
Regardless of PHP's 'magic_quotes_gpc' setting, an unauthenticated
attacker can exploit this flaw to manipulate database queries, which
may lead to disclosure of sensitive information, modification of data,
or attacks against the underlying database.
See also :
http://www.milw0rm.com/exploits/1957
Solution :
Unknown at this time.
Threat Level:
High / CVSS Base Score : 7.0
(AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|