Seditio plug.php pag_sub Parameter SQL Injection

medium Nessus Plugin ID 28375

Synopsis

The remote web server contains a PHP script that is prone to SQL injection attacks.

Description

The version of Seditio installed on the remote host fails to sanitize user input to the 'pag_sub' parameter of the '/plug.php' script when used in conjunction with the search action before using it in a database query. Provided PHP's 'magic_quotes_gpc' setting is disabled, an attacker may be able to exploit this issue to manipulate database queries, leading to disclosure of sensitive information, modification of data, or attacks against the underlying database.

Solution

Upgrade to Seditio version 121 released on 2007-11-30 or later.

Note that the authors have released an update that addresses this issue without changing the version number. Verify that 'Updated' in the comment at the top of '/plugins/search/search.php' is '2007-nov-30' or later.

See Also

http://www.neocrome.net/page.php?id=2349

Plugin Details

Severity: Medium

ID: 28375

File Name: seditio_pag_sub_sql_injection.nasl

Version: 1.14

Type: remote

Family: CGI abuses

Published: 12/2/2007

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

Required KB Items: www/seditio

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Vulnerability Publication Date: 11/29/2007

Reference Information

CVE: CVE-2007-6202

BID: 26655

CWE: 89