BigTree CMS index.php SQL Injection

high Nessus Plugin ID 69369

Synopsis

The remote web server hosts a PHP application that is affected by a SQL injection vulnerability.

Description

The BigTree CMS install hosted on the remote web server fails to sanitize user-supplied input to the application's 'site/index.php' script before using it in a database query.

An unauthenticated attacker may be able to exploit this issue to manipulate database queries, leading to disclosure of sensitive information or attacks against the underlying database.

Note that the application is also likely to be affected by other vulnerabilities such as a cross-request forgery vulnerability and cross-site scripting vulnerabilities, although this plugin has not checked for those.

Solution

Either upgrade to BigTree CMS 4.0 when it is released or replace the file 'core/inc/bigtree/cms.php' with the updated version in GitHub.

See Also

https://www.htbridge.com/advisory/HTB23165

https://www.securityfocus.com/archive/1/527815/30/0/threaded

http://www.nessus.org/u?19778fe3

Plugin Details

Severity: High

ID: 69369

File Name: bigtree_oldroute_sqli.nasl

Version: 1.8

Type: remote

Family: CGI abuses

Published: 8/15/2013

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.0

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:bigtreecms:bigtree_cms

Required KB Items: www/PHP, www/bigtree_cms

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Patch Publication Date: 7/3/2013

Vulnerability Publication Date: 8/7/2013

Exploitable With

Elliot (BigTree CMS 4.0 RC2 SQL Injection)

Reference Information

CVE: CVE-2013-4879

BID: 61699