Invision Gallery index.php st Parameter SQL Injection

high Nessus Plugin ID 20112

Synopsis

The remote web server contains a PHP script that is affected by a SQL injection flaw.

Description

The remote host is running Invision Gallery, a community-based photo gallery plugin for Invision Power Board.

The version of Invision Gallery installed on the remote host fails to properly sanitize user-supplied input to the 'st' parameter of the 'index.php' script before using it in database queries. An attacker may be able to leverage this issue to expose or modify sensitive data or launch attacks against the underlying database.

Solution

Apply the patch referenced in the vendor advisory above.

See Also

https://www.securityfocus.com/archive/1/415297/30/0/threaded

http://forums.invisionpower.com/index.php?showtopic=197816

Plugin Details

Severity: High

ID: 20112

File Name: invision_gallery_st_sql_injection.nasl

Version: 1.23

Type: remote

Family: CGI abuses

Published: 11/1/2005

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.6

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:invision_power_services:invision_gallery

Required KB Items: www/invision_power_board

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: No exploit is required

Vulnerability Publication Date: 10/30/2005

Reference Information

CVE: CVE-2005-3395

BID: 15240