Synopsis
The remote web server contains a PHP script that is susceptible to a SQL injection attack.
Description
The remote host is running Oempro, a commercial list management and email marketing application written in PHP.
The installed version of Oempro fails to sanitize user-supplied input to the 'FormValue_Email' parameter of the 'index.php' script before using it in a database query. An unauthenticated, remote attacker can leverage this issue to manipulate SQL queries and bypass authentication or launch other sorts of SQL injection attacks against the affected host.
Note that there are also reportedly several other issues that are likely associated with this version of Oempro, including insecure cookie disclosure, password disclosure, and cross-frame scripting. Nessus has not, though, checked for those.
Solution
Upgrade to Oempro version 4 or later as that is reported to resolve the issue.
Plugin Details
File Name: oempro_formvalue_email_sql_injection.nasl
Configuration: Enable thorough checks
Supported Sensors: Nessus
Risk Information
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
Vulnerability Information
CPE: cpe:/a:octeth:oempro
Required KB Items: www/PHP
Excluded KB Items: Settings/disable_cgi_scanning
Exploit Ease: No exploit is required
Exploited by Nessus: true