MPC SoftWeb Guestbook Multiple Vulnerabilities

medium Nessus Plugin ID 11590

Language:

Synopsis

The remote web server is hosting an ASP application that is affected by multiple vulnerabilities.

Description

The remote server is running MPCSoftwebGuestbook a set of .asp scripts to manage an online guestbook.

This release comes with a database called 'mpcsoftware_guestdata.mdb', usually located under '/database/' that contains sensitive information, such as the news site administrator password.

An attacker may use this flaw to gain unauthorized access to the remote site and potentially edit it.

Note that this server is also vulnerable to a cross-site-scripting attack, which allows an attacker to have JavaScript code executed on the browser of other hosts.

Solution

Prevent the download of .mdb files from your website.

See Also

https://seclists.org/bugtraq/2003/Apr/253

Plugin Details

Severity: Medium

ID: 11590

File Name: mpcsw_guestbook_database.nasl

Version: 1.25

Type: remote

Family: CGI abuses

Published: 5/7/2003

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

Required KB Items: www/ASP

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: Exploits are available

Reference Information

BID: 7389, 7390

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990