|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> CGI abuses >> Pixelpost < 1.5 RC1 Multiple Vulnerabilities Vulnerability Assessment Details
|
Pixelpost < 1.5 RC1 Multiple Vulnerabilities |
||
Tries to inject SQL code via Pixelpost's showimage parameter Detailed Explanation for this Vulnerability Assessment Summary : The remote web server contains a PHP application that suffers from multiple vulnerabilities. Description : The remote host is running Pixelpost, a photo blog application based on PHP and MySQL. The version of Pixelpost installed on the remote host fails to sanitize input to the 'showimage' parameter of the 'index.php' script before using it to construct database queries. Provided PHP's 'magic_quotes_gpc' setting is disabled, an unauthenticated attacker can exploit this flaw to inject arbitrary SQL code and thereby uncover sensitive information such as authentication credentials, launch attacks against the underlying database application, etc. In addition, the application reportedly contains a similar SQL injection flaw involving the 'USER_AGENT', 'HTTP_REFERER' and 'HTTP_HOST' variables used in 'includes/functions.php', a cross-site scripting issue involving the comment, name, url, and email values when commenting on a post, and an information disclosure flaw involving direct requests to 'includes/phpinfo.php'. See also : http://www.securityfocus.com/archive/1/426764/30/0/threaded http://forum.pixelpost.org/showthread.php?t=3535 Solution : Upgrade to Pixelpost version 1.5 RC1 or later when it becomes available. Network Security Threat Level: High / CVSS Base Score : 7.0 (AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N) Networks Security ID: 16964 Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security |
||
Cables, Connectors |
A-Tech 8GB DDR3 1600 PC3-12800 Laptop SODIMM 204-Pin Memory RAM PC3L DDR3L 1x 8G
$13.99
HyperX FURY DDR3 8GB 16GB 32GB 1600 MHz PC3-12800 Desktop RAM Memory DIMM 240pin
$12.90
A-Tech 8GB PC3-12800 Desktop DDR3 1600 MHz Non ECC 240-Pin DIMM Memory RAM 1x 8G
$13.99
Samsung 128GB (4x 32GB) M86B4G70DM0-CMA3 PC3-14900L 4Rx4 DDR3 ECC Reg Server Mem
$39.99
Lot of 2 32GB DDR4 2666 PC4-21300 SODIMM RAM Modules Mixed Brand
$60.00
HyperX FURY RAM DDR4 16GB 8GB 32GB 4GB 3200 2666 2400 2133 Desktop Memory DIMM
$9.64
Kingston HyperX FURY DDR3 8GB 16GB 32G 1600 1866 1333 Desktop Memory RAM DIMM
$13.25
8GB PC3L-12800S 1600MHz SODIMM DDR3 RAM | Grade A
$12.00
A-Tech 256GB 4x 64GB 4Rx4 PC4-19200 ECC Load Reduced LRDIMM Server Memory RAM
$287.96
A-Tech 128GB 2x 64GB 4Rx4 PC4-19200 ECC Load Reduced LRDIMM Server Memory RAM
$143.98
|
||
No Discussions have been posted on this vulnerability. |