w-Agora 4.1.6a Multiple Input Validation Vulnerabilities

high Nessus Plugin ID 15402

Synopsis

The remote forum management software is vulnerable to multiple injection flaws.

Description

The remote host is running w-agora, a web-based forum management software written in PHP.

There are multiple input validation flaws in the remote version of this software :

- There is a SQL injection vulnerability in the file 'redir_url.php' that could allow an attacker to execute arbitrary SQL statements in the remote database ;

- There is a cross-site scripting issue that could allow an attacker to steal the cookies of the legitimate users of the remote site by sending them a specially malformed link ;

- There is an HTTP response splitting vulnerability that could allow an attacker to perform cross-site scripting attacks against the remote host.

Solution

Upgrade to the newest version of this software.

See Also

https://seclists.org/fulldisclosure/2004/Sep/1083

Plugin Details

Severity: High

ID: 15402

File Name: w_agora_input_vulnerabilities.nasl

Version: 1.26

Type: remote

Family: CGI abuses

Published: 10/1/2004

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.6

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

Required KB Items: www/PHP

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Vulnerability Publication Date: 9/29/2004

Reference Information

CVE: CVE-2004-1562, CVE-2004-1563, CVE-2004-1564, CVE-2004-1565

BID: 11283

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990