Lucene search

K
nessusThis script is Copyright (C) 2005-2022 Tenable Network Security, Inc.PHOTOPOST_MULTIPLE_VULNS.NASL
HistoryMar 11, 2005 - 12:00 a.m.

PhotoPost PHP < 5.0.1 Multiple Remote Vulnerabilities

2005-03-1100:00:00
This script is Copyright (C) 2005-2022 Tenable Network Security, Inc.
www.tenable.com
22

According to its banner, the version of PhotoPost PHP installed on the remote host has several vulnerabilities:

  • An Access Validation Vulnerability.
    The ‘adm-photo.php’ script fails to verify authentication credentials, which allows an attacker to change the properties of thumbnails of uploaded images.

  • A SQL Injection Vulnerability.
    The ‘uid’ parameter in the ‘member.php’ script is not properly sanitized before use in SQL queries. An attacker can leverage this flaw to disclose or modify sensitive information or perhaps even launch attacks against the underlying database implementation.

  • A Cross-site Scripting (XSS) Vulnerability.
    The ‘editbio’ parameter of the user profile form is not sanitized properly, allowing an attacker to inject arbitrary script or HTML in a user’s browser in the context of the affected website, resulting in theft of authentication data or other such attacks.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(17314);
  script_version("1.25");
  script_set_attribute(attribute:"plugin_modification_date", value:"2022/04/11");

  script_cve_id(
    "CVE-2005-0774",
    "CVE-2005-0775",
    "CVE-2005-0776",
    "CVE-2005-0777",
    "CVE-2005-0778",
    "CVE-2005-1629"
  );
  script_bugtraq_id(12779, 13620);

  script_name(english:"PhotoPost PHP < 5.0.1 Multiple Remote Vulnerabilities");

  script_set_attribute(attribute:"synopsis", value:
"The remote web server contains a PHP application that is affected by
several vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"According to its banner, the version of PhotoPost PHP installed on the
remote host has several vulnerabilities:

  - An Access Validation Vulnerability.
    The 'adm-photo.php' script fails to verify authentication
    credentials, which allows an attacker to change the 
    properties of thumbnails of uploaded images.

  - A SQL Injection Vulnerability.
    The 'uid' parameter in the 'member.php' script is not 
    properly sanitized before use in SQL queries. An
    attacker can leverage this flaw to disclose or modify
    sensitive information or perhaps even launch attacks
    against the underlying database implementation.

  - A Cross-site Scripting (XSS) Vulnerability.
    The 'editbio' parameter of the user profile form is not sanitized
    properly, allowing an attacker to inject arbitrary script or
    HTML in a user's browser in the context of the affected website, 
    resulting in theft of authentication data or other such attacks.");
  script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2005/Mar/213");
  script_set_attribute(attribute:"see_also", value:"https://seclists.org/fulldisclosure/2005/May/311");
  script_set_attribute(attribute:"solution", value:
"Upgrade to PhotoPost PHP version 5.01 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");

  script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);

  script_set_attribute(attribute:"vuln_publication_date", value:"2005/03/11");
  script_set_attribute(attribute:"plugin_publication_date", value:"2005/03/11");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:photopost:photopost_php");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:photopost:photopost_php_pro");
  script_set_attribute(attribute:"thorough_tests", value:"true");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CGI abuses");

  script_copyright(english:"This script is Copyright (C) 2005-2022 Tenable Network Security, Inc.");

  script_dependencies("photopost_detect.nasl");
  script_require_keys("www/photopost");
  script_exclude_keys("Settings/disable_cgi_scanning");
  script_require_ports("Services/www", 80);

  exit(0);
}

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");


port = get_http_port(default:80);
if (!can_host_php(port:port)) exit(0);


# Test an install.
install = get_kb_item(string("www/", port, "/photopost"));
if (isnull(install)) exit(0);
matches = eregmatch(string:install, pattern:"^(.+) under (/.*)$");
if (!isnull(matches)) {
  ver = matches[1];

  if (ver =~ "^[0-4].*|5\.0[^0-9]?|5\.0rc[123]$")
  {
   security_hole(port);
   set_kb_item(name: 'www/'+port+'/XSS', value: TRUE);
   set_kb_item(name: 'www/'+port+'/SQLInjection', value: TRUE);
  }
}
VendorProductVersionCPE
photopostphotopost_phpcpe:/a:photopost:photopost_php
photopostphotopost_php_procpe:/a:photopost:photopost_php_pro
Related for PHOTOPOST_MULTIPLE_VULNS.NASL