phpMyWebHosting Authentication SQL Injection

high Nessus Plugin ID 16208

Synopsis

Arbitrary SQL statements may be executed on the remote database.

Description

The remote host is running PHPMyWebHosting, a web hosting management interface written in PHP.

The remote version of this software does not perform a proper validation of user-supplied input and is, therefore, vulnerable to a SQL injection attack.

An attacker may execute arbitrary SQL statements against the remote database by sending a malformed username containing SQL escape characters when logging into the remote interface in 'login.php'.

Solution

None at this time.

Plugin Details

Severity: High

ID: 16208

File Name: phpmywebhosting_sql_injection.nasl

Version: 1.20

Type: remote

Family: CGI abuses

Published: 1/19/2005

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: High

Base Score: 7.3

Temporal Score: 7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:phpmywebhosting:phpmywebhosting

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Vulnerability Publication Date: 8/14/2004

Reference Information

CVE: CVE-2004-2218

BID: 10942