|
Family: CGI abuses --> Category: attack
X7 Chat old_prefix SQL Injection Vulnerability Vulnerability Scan
Vulnerability Scan Summary Checks for SQL injection flaw in X7 Chat
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote web server contains a PHP script that is prone to a SQL
injection attack.
Description :
The remote host is running X7 Chat, a web-based chat program written
in PHP.
The version of X7 Chat installed on the remote host fails to properly
sanitize input to the 'old_prefix' parameter of the 'upgradev1.php'
script before using it in a database query. This may allow an
unauthenticated attacker to uncover sensitive information such as
password hashes, modify data, launch attacks against the underlying
database, etc.
Note that successful exploitation is possible regardless of PHP's
'magic_quotes_gpc' setting.
See also :
http://www.milw0rm.com/exploits/2068
Solution :
Unknown at this time.
Threat Level:
High / CVSS Base Score : 7
(AV:R/AC:L/Au:NR/C:P/A:P/I:P/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|