phpMyFAQ Forum Message username Field SQL Injection

high Nessus Plugin ID 17298

Synopsis

The remote web server contains a PHP script that allows for SQL injection attacks.

Description

The remote host is running a version of phpMyFAQ that fails to sufficiently sanitize the 'username' parameter before using it in SQL queries. As a result, a remote attacker can pass malicious input to database queries, potentially resulting in data exposure, data modification, or attacks against the database itself.

Solution

Upgrade to phpMyFAQ version 1.4.7 or 1.5.0 RC2 or greater.

See Also

http://www.phpmyfaq.de/advisory_2005-03-06.php

Plugin Details

Severity: High

ID: 17298

File Name: phpmyfaq_username_sql_injection.nasl

Version: 1.17

Type: remote

Family: CGI abuses

Published: 3/9/2005

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:phpmyfaq:phpmyfaq

Required KB Items: www/phpmyfaq

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Vulnerability Publication Date: 3/6/2005

Reference Information

CVE: CVE-2005-0702

BID: 12741