Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> Gravity Board X <= 1.1 Multiple Vulnerabilities


Vulnerability Assessment Details

Gravity Board X <= 1.1 Multiple Vulnerabilities

Vulnerability Assessment Summary
Checks for multiple vulnerabilities in Gravity Board X <= 1.1

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote web server contains a PHP application that is affected by
multiple vulnerabilities.

Description :

The remote host is running Gravity Board X, an open-source, web-based
electronic forum written in PHP.

The version of Gravity Board X installed on the remote host suffers
from several flaws, including :

- Unauthorized Access Vulnerability
The 'editcss.php' script does not require authentication
before writing user-supplied input to template files. By
exploiting this flaw, a possible hacker may be able to deface
the affected site or run arbitrary PHP code (see below).

- SQL Injection Vulnerability
The application does not sanitize user-supplied input to
the 'email' parameter of the 'index.php' script before
using it in database queries. By exploiting this flaw,
a possible hacker can bypass authentication and possibly
disclose or modify data or launch attacks against the
underlying database.

- Arbitrary PHP Code Execution Vulnerability
Using either of the two previous flaws, a possible hacker
can inject arbitrary PHP code into template files,
which will then be executed on the remote host within
the context of the web server userid with each page
view.

See also :

http://www.retrogod.altervista.org/gravity.html
http://archives.neohapsis.com/archives/bugtraq/2005-08/0100.html

Solution :

Unknown at this time.

Network Security Threat Level:

High / CVSS Base Score : 7
(AV:R/AC:L/Au:NR/C:P/A:P/I:P/B:N)

Networks Security ID: 14497, 14499, 14502

Vulnerability Assessment Copyright: This script is Copyright (C) 2005-2006 Tenable Network Security

Cables, Connectors

HP ProLiant DL380 G6 Server Dual Xeon X5650 6C 2.66GHz 128GB
$340.0
HP ProLiant DL380 G6 Server Dual Xeon X5650 6C 2.66GHz 128GB pictureHP ProLiant DL380p G8 Dual E5-2670 v2 8C 3.0GHz 32GB 5x 300GB SAS SFF RPS 25 Bay
$1562.0
HP ProLiant DL380p G8 Dual E5-2670 v2 8C 3.0GHz 32GB 5x 300GB SAS SFF RPS 25 Bay pictureDell PowerEdge R710 Dual Xeon X5550 QC 2.66GHz 64GB 6/i 2x 480GB SSD 2.5in
$829.0
Dell PowerEdge R710 Dual Xeon X5550 QC 2.66GHz 64GB 6/i 2x 480GB SSD 2.5in pictureHP DL380e G8 Single E5-2430L 6C 2.0GHz 32GB P420/1GB 25x 450GB SAS 25 Bay SFF
$2202.0
HP DL380e G8 Single E5-2430L 6C 2.0GHz 32GB P420/1GB 25x 450GB SAS 25 Bay SFF picture


Discussions

No Discussions have been posted on this vulnerability.