Cerberus Support Center Multiple Remote Vulnerabilities (SQLi, XSS)

high Nessus Plugin ID 20347

Synopsis

The remote web server has a PHP application that is affected by SQL injection and cross-site scripting flaws.

Description

The remote host is running Cerberus Support Center, a customer support portal written in PHP.

The installed version of Cerberus Support Center is affected by a cross-site scripting flaw due to its failure to sanitize input to the 'kb_ask' parameter of the 'index.php' script before using it in dynamically-generated web pages. In addition, it reportedly fails to sanitize input to the 'file_id' parameter of the 'attachment_send.php' script before using it in database queries.

Exploitation of the SQL injection vulnerability requires that an attacker first authenticate while the cross-site scripting issue may be possible without authentication, depending on the application's configuration.

Solution

Upgrade to Cerberus Support Center 3.2.0pr2 and edit 'attachment_send.php' as described in the forum post referenced above. Note that this does not, though, fix the cross-site scripting issue.

See Also

http://www.cerberusweb.com/devblog/?p=56

https://seclists.org/fulldisclosure/2005/Dec/972

Plugin Details

Severity: High

ID: 20347

File Name: cerberus_support_center_mult_flaws.nasl

Version: 1.28

Type: remote

Family: CGI abuses

Published: 12/29/2005

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.6

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

Required KB Items: www/PHP

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: No exploit is required

Vulnerability Publication Date: 12/20/2005

Reference Information

CVE: CVE-2005-4427, CVE-2005-4428

BID: 16062

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990