|
Family: CGI abuses --> Category: attack
Website Baker REMEMBER_KEY Cookie SQL Injection Vulnerability Vulnerability Scan
Vulnerability Scan Summary Tries to bypass authentication with Website Baker
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote web server contains a PHP script that is prone to a SQL
injection attack.
Description :
The remote host is running Website Baker, a PHP-based content
management system.
The installed version of Website Baker fails to validate input to the
'REMEMBER_KEY' cookie before using it in 'framework/class.login.php'
to construct SQL queries. Provided PHP's 'magic_quotes_gpc' setting
is disabled, an unauthenticated remote attacker can leverage this
issue to manipulate database queries, possibly to gain administrative
access to the application or launch other sorts of SQL injection
attacks against the affected host.
See also :
http://www.securityfocus.com/archive/1/457684/30/0/threaded
Solution :
Unknown at this time.
Threat Level:
Medium / CVSS Base Score : 5.6
(AV:R/AC:H/Au:NR/C:P/I:P/A:P/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|