XOOPS Dictionary Module print.php id Parameter SQL Injection

high Nessus Plugin ID 31606

Synopsis

The remote web server contains a PHP script that is prone to a SQL injection attack.

Description

The version of the Dictionary module for XOOPS installed on the remote host fails to sanitize user-supplied input to the 'id' parameter of the 'print.php' script before using it in a database query. Regardless of PHP's 'magic_quotes_gpc' setting, an attacker may be able to exploit this issue to manipulate database queries, leading to disclosure of sensitive information, execution of arbitrary code, or attacks against the underlying database.

Solution

Unknown at this time.

Plugin Details

Severity: High

ID: 31606

File Name: xoops_dictionary_id_sql_injection.nasl

Version: 1.17

Type: remote

Family: CGI abuses

Published: 3/19/2008

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 7.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:xoops:xoops_dictionary

Required KB Items: www/xoops

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: Exploits are available

Reference Information

BID: 28275