The remote host is using Snitz Forum 2000 which allows an attacker to execute stored procedures and non-interactive operating system commands on the system. The problem stems from the 'Email' variable in the register.asp module failing to properly validate and strip out malicious SQL data. An attacker exploiting this flaw would need network access to the webserver
Reporter | Title | Published | Views | Family All 9 |
---|---|---|---|---|
![]() | CVE-2003-0286 | 16 Jun 200304:00 | – | nvd |
![]() | Snitz Forums 2000 < 3.4.03 register.asp Email Parameter SQL Injection | 4 Aug 200400:00 | – | nessus |
![]() | Snitz Forums 2000 register.asp Email Parameter SQL Injection | 12 May 200300:00 | – | nessus |
![]() | Snitz Forums 2000 <= 3.4.07 register.asp 'Email' Parameter SQL Injection | 3 Aug 200900:00 | – | nessus |
![]() | Snitz Forums 2000 'register.asp' SQL Injection Vulnerability | 22 Jul 200900:00 | – | openvas |
![]() | Snitz Forums 2000 'register.asp' SQL Injection Vulnerability | 22 Jul 200900:00 | – | openvas |
![]() | Snitz Forums 2000 SQL injection | 3 Nov 200500:00 | – | openvas |
![]() | CVE-2003-0286 | 16 Jun 200304:00 | – | cve |
![]() | CVE-2003-0286 | 14 May 200304:00 | – | cvelist |
Source | Link |
---|---|
securityfocus | www.securityfocus.com/bid/7549 |
# SPDX-FileCopyrightText: 2004 David Maciejak
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if (description)
{
script_oid("1.3.6.1.4.1.25623.1.0.14227");
script_version("2023-08-03T05:05:16+0000");
script_tag(name:"last_modification", value:"2023-08-03 05:05:16 +0000 (Thu, 03 Aug 2023)");
script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/7549");
script_cve_id("CVE-2003-0286");
script_xref(name:"OSVDB", value:"4638");
script_name("Snitz Forums 2000 SQL injection");
script_tag(name:"cvss_base", value:"7.5");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_category(ACT_GATHER_INFO);
script_tag(name:"qod_type", value:"remote_banner");
script_family("Web application abuses");
script_copyright("Copyright (C) 2004 David Maciejak");
script_dependencies("snitz_forums_2000_detect.nasl");
script_require_ports("Services/www", 80);
script_mandatory_keys("snitzforums/detected");
script_tag(name:"summary", value:"The remote host is using Snitz Forum 2000 which allows an attacker
to execute stored procedures and non-interactive operating system commands on the system.");
script_tag(name:"insight", value:"The problem stems from the fact that the 'Email' variable
in the register.asp module fails to properly validate and strip out malicious SQL data.");
script_tag(name:"impact", value:"An attacker, exploiting this flaw, would need network access
to the webserver. A successful attack would allow the remote attacker the ability to potentially
execute arbitrary system commands through common SQL stored procedures such as xp_cmdshell.");
script_tag(name:"solution_type", value:"WillNotFix");
script_tag(name:"solution", value:"No known solution was made available for at least one year
since the disclosure of this vulnerability. Likely none will be provided anymore.
General solution options are to upgrade to a newer release, disable respective features,
remove the product or replace the product by another one.");
exit(0);
}
include("http_func.inc");
include("port_service_func.inc");
port = http_get_port(default:80);
if(!version = get_kb_item(string("www/", port, "/SnitzForums")))exit(0);
if(!matches = eregmatch(string:version, pattern:"^(.+) under (/.*)$"))exit(0);
vers = matches[1];
if(vers && "unknown" >!< vers) {
# jwl: per CVE, all version prior to 3.3.03 are vulnerable
if (egrep(string:vers, pattern:"^([0-2]\.*|3\.[0-2]\.*|3\.3\.0[0-2])")) {
security_message(port);
exit(0);
}
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo