LimeSurvey sUser Parameter SQL Injection

high Nessus Plugin ID 38694

Synopsis

The remote web server contains a PHP script that is prone to a SQL injection attack.

Description

The remote host is running LimeSurvey, an open source tool for online surveys.

The version of LimeSurvey installed on the remote host fails to sanitize user-supplied input passed to the 'sUser' argument in the 'checkUser()' method of the 'LsrcHelper' class in 'admin/remotecontrol/lsrc.helper.php' before using it to construct database queries. Regardless of PHP's 'magic_quotes_gpc' setting, an unauthenticated attacker can exploit this issue to manipulate database queries to, for example, bypass authentication and gain administrative access, which in turn could allow for arbitrary code execution.

Solution

Either upgrade to LimeSurvey 1.82 or later, or remove the application's 'admin/remotecontrol' directory.

See Also

http://www.nessus.org/u?12f68001

http://www.nessus.org/u?970f06dc

Plugin Details

Severity: High

ID: 38694

File Name: limesurvey_suser_sql_injection.nasl

Version: 1.16

Type: remote

Family: CGI abuses

Published: 5/6/2009

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:limesurvey:limesurvey

Required KB Items: www/PHP

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No known exploits are available

Exploited by Nessus: true

Reference Information

CVE: CVE-2009-1604

BID: 34785

SECUNIA: 34946