Invision Power Board sources/post.php qpid Parameter SQL Injection

high Nessus Plugin ID 15778

Synopsis

The remote web server contains a PHP application that is vulnerable to a SQL injection attack.

Description

The version of Invision Power Board on the remote host suffers from a flaw in 'sources/post.php' that allows injection of SQL commands into the remote SQL database. An attacker may use this flaw to gain control of the remote database and possibly to overwrite files on the remote host.

Solution

Replace the 'sources/post.php' file with the one referenced in the vendor advisory above.

See Also

https://seclists.org/bugtraq/2004/Nov/239

http://forums.invisionpower.com/index.php?showtopic=154916

Plugin Details

Severity: High

ID: 15778

File Name: ipb_post_sql.nasl

Version: 1.20

Type: remote

Family: CGI abuses

Published: 11/22/2004

Updated: 6/1/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.6

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

Required KB Items: www/invision_power_board

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: No exploit is required

Vulnerability Publication Date: 11/18/2004

Reference Information

CVE: CVE-2004-1531

BID: 11703