Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> DUforum Multiple SQL Injection Vulnerabilities


Vulnerability Assessment Details

DUforum Multiple SQL Injection Vulnerabilities

Vulnerability Assessment Summary
Checks for multiple SQL injection vulnerabilities in DUforum

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote web server contains an ASP application that is vulnerable
to multiple SQL injection attacks.

Description :

The remote host is running DUforum, a web-based message board written
in ASP from DUware.

The installed version of DUforum fails to properly sanitize user-
supplied input in several instances before using it in SQL queries.
By exploiting these flaws, a possible hacker can affect database queries,
possibly disclosing sensitive data and launching attacks against the
underlying database.

See also :

http://echo.or.id/adv/adv19-theday-2005.txt
http://archives.neohapsis.com/archives/bugtraq/2005-06/0172.html

Solution :

Unknown at this time.

Network Security Threat Level:

Medium / CVSS Base Score : 5
(AV:R/AC:L/Au:NR/C:P/A:N/I:P/B:N)

Networks Security ID: 14035

Vulnerability Assessment Copyright: This script is Copyright (C) 2005-2006 Tenable Network Security


Warning: mysql_connect() [function.mysql-connect]: Too many connections in /home/vscan/public_html/store/select.php on line 4

Warning: mysql_select_db() expects parameter 2 to be resource, boolean given in /home/vscan/public_html/store/select.php on line 5

Warning: mysql_fetch_array() expects parameter 1 to be resource, boolean given in /home/vscan/public_html/store/select.php on line 13

PMC-SIERRA PM8003 SCC Rev:5.0 PCI-E RAID CONTROLLER CARD
$29.0
PMC-SIERRA PM8003 SCC Rev:5.0 PCI-E RAID CONTROLLER CARD pictureHP ProLiant DL360 G7 VMware Server 2x 2.80GHz X5660 Hexa Core 144Gb 4x 72Gb Raid
$759.0
HP ProLiant DL360 G7 VMware Server 2x 2.80GHz X5660 Hexa Core 144Gb 4x 72Gb Raid pictureDell Precision T1650 (Win 10, Core i7, 16GB RAM, NVS 510, 500GB RAID)
$249.99
Dell Precision T1650 (Win 10, Core i7, 16GB RAM, NVS 510, 500GB RAID) pictureLSI MR SAS 8888ELP 8-Channel SAS RAID Controller L3-01119-14B 370-2048-00 PCIex8
$19.95
LSI MR SAS 8888ELP 8-Channel SAS RAID Controller L3-01119-14B 370-2048-00 PCIex8 picture


Discussions


Warning: mysql_connect() [function.mysql-connect]: Too many connections in /home/vscan/public_html/comments.php on line 3

Warning: mysql_select_db() expects parameter 2 to be resource, boolean given in /home/vscan/public_html/comments.php on line 4

Warning: mysql_fetch_array() expects parameter 1 to be resource, boolean given in /home/vscan/public_html/comments.php on line 16

No Discussions have been posted on this vulnerability.