Exhibit Engine list.php Multiple Parameter SQL Injection

high Nessus Plugin ID 18416

Synopsis

The remote web server contains a PHP application that is vulnerable to SQL injection attacks.

Description

The remote host is running Exhibit Engine, a web-based photo gallery written in PHP.

The version installed on the remote host suffers from a SQL injection vulnerability due to its failure to sanitize user-supplied input to various parameters of the 'list.php' script. An attacker can exploit these flaws to inject arbitrary SQL statements into the affected application, possibly even reading arbitrary database entries.

Solution

Upgrade if necessary to EE 1.5RC4 and apply the patched 'slashwork.php' script referenced in the first URL above.

See Also

https://seclists.org/fulldisclosure/2005/Jun/7

https://photography-on-the.net/forum/showthread.php?p=579692

Plugin Details

Severity: High

ID: 18416

File Name: exhibit_engine_sql_injection.nasl

Version: 1.23

Type: remote

Family: CGI abuses

Published: 6/6/2005

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.8

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:exhibit_engine:exhibit_engine

Required KB Items: www/PHP

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: No exploit is required

Vulnerability Publication Date: 6/3/2005

Reference Information

CVE: CVE-2005-1875

BID: 13844

Secunia: 15583