Plogger plog-download.php checked[] Parameter SQL Injection

medium Nessus Plugin ID 33823

Synopsis

The remote web server contains a PHP script that is prone to a SQL injection attack.

Description

The remote host appears to be running Plogger, an open source photo gallery written in PHP.

The version of Plogger installed on the remote host fails to sanitize input to the 'checked' array parameter of the 'plog-download.php' script when 'dl_type' is set to 'album' before using it in a database query. Provided PHP's 'magic_quotes_gpc' setting is disabled, an attacker can leverage this issue to manipulate database queries, leading to disclosure of sensitive information, modification of data, or attacks against the underlying database.

Note that several other issues were disclosed along with this one and that together they could lead to a complete compromise of the affected install. Nessus has not, though, checked for those other issues.

Solution

Unknown at this time.

See Also

http://www.nessus.org/u?562ee845

https://www.securityfocus.com/archive/1/495116/30/0/threaded

Plugin Details

Severity: Medium

ID: 33823

File Name: plogger_checked_sql_injection.nasl

Version: 1.16

Type: remote

Family: CGI abuses

Published: 8/6/2008

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:plogger:plogger

Required KB Items: www/PHP

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Reference Information

CVE: CVE-2008-3563

BID: 30547

CWE: 89