|
Family: CGI abuses --> Category: attack
e107 cookie SQL Injection Vulnerability Vulnerability Scan
Vulnerability Scan Summary Tries to bypass authentication in e107 with a special cookie
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote web server contains a PHP script that is affected by a SQL
injection issue.
Description :
The version of e107 installed on the remote host fails to sanitize
input to the application-specific cookie used for authentication.
Provided PHP's 'magic_quotes_gpc' setting is disabled, an
unauthenticated attacker can leverage this issue to bypass
authentication and generally manipulate SQL queries.
See also :
http://www.securityfocus.com/archive/1/433938/30/0/threaded
http://www.nessus.org/u?957c33df
Solution :
Upgrade to e107 version 0.7.4 or later.
Threat Level:
Medium / CVSS Base Score : 6
(AV:R/AC:H/Au:NR/C:P/A:P/I:P/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|