Lucene search

K
nessusThis script is Copyright (C) 2005-2021 Tenable Network Security, Inc.SQUIRRELCART_SQL.NASL
HistoryMar 30, 2005 - 12:00 a.m.

Squirrelcart index.php Multiple Parameter SQL Injection

2005-03-3000:00:00
This script is Copyright (C) 2005-2021 Tenable Network Security, Inc.
www.tenable.com
16

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.002 Low

EPSS

Percentile

61.1%

The remote host is running SquirrelCart, a shopping cart program written in PHP.

There is a flaw in the remote software that may allow anyone to inject arbitrary SQL commands, which may in turn be used to gain administrative access on the remote host.

SquirrelCart 1.5.5 and prior versions are affected by this flaw.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if(description)
{
 script_id(17652);
 script_version("1.19");
 script_cve_id("CVE-2005-0962");
 script_bugtraq_id(12944);

 script_name(english:"Squirrelcart index.php Multiple Parameter SQL Injection");
 
 script_set_attribute(attribute:"synopsis", value:
"The remote web server contains a PHP application that is subject to
SQL injection attacks." );
 script_set_attribute(attribute:"description", value:
"The remote host is running SquirrelCart, a shopping cart program
written in PHP. 

There is a flaw in the remote software that may allow anyone to inject
arbitrary SQL commands, which may in turn be used to gain
administrative access on the remote host. 

SquirrelCart 1.5.5 and prior versions are affected by this flaw." );
 script_set_attribute(attribute:"see_also", value:"http://www.ldev.com/forums/showthread.php?t=1860" );
 script_set_attribute(attribute:"solution", value:
"Upgrade to SquirrelCart 1.6.0 or download a patch from
SquirrelCart.com." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
 script_set_attribute(attribute:"exploit_available", value:"false");

 script_set_attribute(attribute:"plugin_publication_date", value: "2005/03/30");
 script_set_attribute(attribute:"vuln_publication_date", value: "2005/03/30");
 script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/19");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_end_attributes();

 
 script_summary(english:"SQL Injection in Squirrelcart");
 
 script_category(ACT_ATTACK);
 
 script_copyright(english:"This script is Copyright (C) 2005-2021 Tenable Network Security, Inc.");
 script_family(english:"CGI abuses");
 script_dependencie("http_version.nasl");
 script_require_ports("Services/www", 80);
 script_exclude_keys("Settings/disable_cgi_scanning");
 script_require_keys("www/PHP");
 exit(0);
}

# Check starts here

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");


global_var port;

function check(dir)
{
  local_var buf, w;

  w = http_send_recv3(method:"GET", item:dir + "/store.php?crn=42'&action=show&show_products_mode=cat_click", port:port);
  if (isnull(w)) exit(1, "The web server did not answer");
  buf = w[2];

  if('SELECT Table_2 FROM REL_SubCats__Cats WHERE Table_2 = ' >< buf )
  	{
	security_hole(port);
	set_kb_item(name: 'www/'+port+'/SQLInjection', value: TRUE);
	exit(0);
	}
 
 
 return(0);
}

port = get_http_port(default:80);

if(!get_port_state(port))exit(0);
if ( ! can_host_php(port:port) ) exit(0);

foreach dir (cgi_dirs()) check( dir:dir );

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.002 Low

EPSS

Percentile

61.1%

Related for SQUIRRELCART_SQL.NASL