FreeBSD : mambo -- multiple SQL injection vulnerabilities (8a5770b4-54b5-11db-a5ae-00508d6a62df)

This script is Copyright (C) 2011-2014 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

James Bercegay reports :

Mambo is vulnerable to an Authentication Bypass issue that is due to
a SQL Injection in the login function. The SQL Injection is possible
because the $passwd variable is only sanitized when it is not passed
as an argument to the function.

Omid reports :

There are several sql injections in Mambo 4.6 RC2 & Joomla 1.0.10 (and
maybe other versions) :

- When a user edits a content, the 'id' parameter is not checked
properly in /components/com_content/content.php, which can cause 2 sql
injections.

- The 'limit' parameter in the administration section is not checked.
This affects many pages of administration section

- In the administration section, while editing/creating a user, the
'gid' parameter is not checked properly.

See also :

http://www.gulftech.org/?node=research&article_id=00116-10042006
http://seclists.org/bugtraq/2006/Aug/0491.html
http://www.frsirt.com/english/advisories/2006/3918
http://www.nessus.org/u?1e2bf4b9
http://www.nessus.org/u?6524001d

Solution :

Update the affected package.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 6.2
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 55439 ()

Bugtraq ID: 19719
19734

CVE ID: CVE-2007-0374

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now