|
Vulnerability Assessment & Network Security Forums |
||||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> CGI abuses >> PunBB Input Validation Vulnerabilities Vulnerability Assessment Details
|
PunBB Input Validation Vulnerabilities |
||
Detects input validation vulnerabilities in PunBB Detailed Explanation for this Vulnerability Assessment Summary : The remote web server contains a PHP application that suffers from multiple vulnerabilities. Description : The remote host is running a version of PunBB that fails to properly sanitize user-input to several scripts thereby enabling a possible hacker to launch various SQL injection attacks. In addition, the profile.php script enables anyone to call the change_pass action while specifying the id of an existing user to set their password to NULL, effectively shutting them out of the system. See also : http://marc.theaimsgroup.com/?l=bugtraq&m=110927754230666&w=2 http://forums.punbb.org/viewtopic.php?id=6460 Solution : Upgrade to PunBB 1.2.2 or later. Network Security Threat Level: Medium / CVSS Base Score : 5 (AV:R/AC:L/Au:NR/C:P/A:N/I:P/B:N) Networks Security ID: 12652 Vulnerability Assessment Copyright: This script is Copyright (C) 2005-2007 Tenable Network Security |
||
Cables, Connectors |
![]() |
|
||
No Discussions have been posted on this vulnerability. |