Lucene search

K
openvasCopyright (C) 2005 Noam RathausOPENVAS:136141256231018209
HistoryNov 03, 2005 - 12:00 a.m.

myBloggie Multiple Vulnerabilities

2005-11-0300:00:00
Copyright (C) 2005 Noam Rathaus
plugins.openvas.org
11

6.6 Medium

AI Score

Confidence

Low

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.017 Low

EPSS

Percentile

87.4%

myBloggie is prone to multiple vulnerabilities.

# SPDX-FileCopyrightText: 2005 Noam Rathaus
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.18209");
  script_version("2023-12-13T05:05:23+0000");
  script_tag(name:"last_modification", value:"2023-12-13 05:05:23 +0000 (Wed, 13 Dec 2023)");
  script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_cve_id("CVE-2005-1140", "CVE-2005-1498", "CVE-2005-1499", "CVE-2005-1500");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_name("myBloggie Multiple Vulnerabilities");
  script_category(ACT_ATTACK);
  script_copyright("Copyright (C) 2005 Noam Rathaus");
  script_family("Web application abuses");
  script_dependencies("find_service.nasl", "no404.nasl", "webmirror.nasl", "DDI_Directory_Scanner.nasl", "gb_php_http_detect.nasl", "global_settings.nasl");
  script_require_ports("Services/www", 80);
  script_exclude_keys("Settings/disable_cgi_scanning");

  script_xref(name:"URL", value:"http://mywebland.com/forums/viewtopic.php?t=180");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/13192");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/13507");

  script_tag(name:"solution", value:"Patches have been provided by the vendor and are
  available at the referenced URL.");

  script_tag(name:"affected", value:"myBloggie 2.1.1 is known to be affected.");

  script_tag(name:"summary", value:"myBloggie is prone to multiple vulnerabilities.");

  script_tag(name:"insight", value:"The following flaws exist:

  - Full Path Disclosure: Due to an improper sanitization of the post_id parameter, it's
  possible to show the full path by sending a simple request.

  - Cross-Site Scripting (XSS): Input passed to 'year' parameter in viewmode.php is not
  properly sanitised before being returned to users. This can be exploited execute
  arbitrary HTML and script code in a user's browser session in context of a
  vulnerable site.

  - SQL Injection: When myBloggie get the value of the 'keyword' parameter and put it in
  the SQL query, don't sanitise it. So a remote user can do SQL injection attacks.");

  script_tag(name:"qod_type", value:"remote_active");

  script_tag(name:"solution_type", value:"VendorFix");

  exit(0);
}

include("http_func.inc");
include("http_keepalive.inc");
include("port_service_func.inc");
include("list_array_func.inc");

port = http_get_port(default:80);
if(!http_can_host_php(port:port))
  exit(0);

foreach dir(make_list_unique("/", http_cgi_dirs(port:port))) {

  if(dir == "/")
    dir = "";

  res = http_get_cache(item:dir + "/index.php", port:port);
  if(!res || 'mywebland.com">myBloggie ' >!< res)
    continue;

  url = dir + "/index.php?mode=viewid&post_id=1'";

  if(http_vuln_check(port:port, url:url, pattern:"You have an error in your SQL syntax")) {
    report = http_report_vuln_url(port:port, url:url);
    security_message(port:port, data:report);
    exit(0);
  }
}

exit(99);

6.6 Medium

AI Score

Confidence

Low

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.017 Low

EPSS

Percentile

87.4%

Related for OPENVAS:136141256231018209