GoSmart Message Board Multiple Vulnerabilities (SQLi, XSS)

high Nessus Plugin ID 15451

Synopsis

A remote CGI is vulnerable to several flaws.

Description

The remote host is running GoSmart message board, a bulletin board manager written in ASP.

The remote version of this software contains multiple flaws, due to a failure of the application to properly sanitize user-supplied input.

It is also affected by a cross-site scripting vulnerability. As a result of this vulnerability, it is possible for a remote attacker to create a malicious link containing script code that will be executed in the browser of an unsuspecting user when followed.

Furthermore, this version is vulnerable to SQL injection flaws that let an attacker inject arbitrary SQL commands.

Solution

Upgrade to the newest version of this software.

Plugin Details

Severity: High

ID: 15451

File Name: gosmart_message_board.nasl

Version: 1.25

Type: remote

Family: CGI abuses

Published: 10/11/2004

Updated: 4/11/2022

Configuration: Enable paranoid mode, Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.3

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 7.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:gosmart:gosmart_message_board

Required KB Items: Settings/ParanoidReport, www/ASP

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: No exploit is required

Vulnerability Publication Date: 9/29/2004

Reference Information

CVE: CVE-2004-1588, CVE-2004-1589

BID: 11361

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990