PostNuke <= 0.760 RC2 Multiple Vulnerabilities

high Nessus Plugin ID 17240

Synopsis

The remote web server contains a PHP application that suffers from multiple vulnerabilities.

Description

The remote host is running PostNuke version 0.760 RC2 or older. These versions suffer from several vulnerabilities, among them :

- SQL injection vulnerability in the News, NS-Polls and NS-AddStory modules.
- SQL injection vulnerability in the Downloads module.
- Cross-site scripting vulnerabilities in the Downloads module.
- Possible path disclosure vulnerability in the News module.

An attacker may use the SQL injection vulnerabilities to obtain the password hash for the administrator or to corrupt the database database used by PostNuke.

Exploiting the XSS flaws may enable an attacker to inject arbitrary script code into the browser of site administrators leading to disclosure of session cookies.

Solution

Either upgrade and apply patches for 0.750 or upgrade to 0.760 RC3 or later.

See Also

https://seclists.org/bugtraq/2005/Mar/8

http://news.postnuke.com/Article2669.html

Plugin Details

Severity: High

ID: 17240

File Name: postnuke_0_760_rc2.nasl

Version: 1.22

Type: remote

Family: CGI abuses

Published: 3/1/2005

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.8

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:postnuke_software_foundation:postnuke

Required KB Items: www/PHP

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Vulnerability Publication Date: 2/28/2005

Reference Information

CVE: CVE-2005-0615, CVE-2005-0616, CVE-2005-0617

BID: 12683, 12684, 12685