Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> CGI abuses >> PHP Support Tickets SQL Injection Vulnerability

Vulnerability Assessment Details

PHP Support Tickets SQL Injection Vulnerability

Vulnerability Assessment Summary
Checks for SQL injection vulnerability in PHP Support Tickets

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote web server has a PHP application that is affected by a SQL
injection flaw.

Description :

The remote host is running PHP Support Tickets, an open-source support
ticketing system written in PHP.

The installed version of PHP Support Tickets does not validate input
to the 'username' or 'password' parameters of the 'index.php' script
before using it in a database query. A possible hacker may be able to
leverage this issue to manipulate SQL queries to, for example, bypass
authentication and gain administrative access to the affected

See also :

Solution :

Contact the vendor as reportedly there is a patch to fix the issue.

Network Security Threat Level:

High / CVSS Base Score : 7.0

Networks Security ID: 15853

Vulnerability Assessment Copyright: This script is Copyright (C) 2005-2006 Tenable Network Security

Cables, Connectors


No Discussions have been posted on this vulnerability.