Synopsis
The remote web server contains a PHP script that is prone to a SQL injection attack.
Description
The remote host is running Meeting Room Booking System (MRBS), a PHP application for booking meeting rooms or other resources.
The version of MRBS installed on the remote host fails to sanitize user-supplied input to the 'area' parameter of the 'month.php' script before using it to construct database queries. Regardless of PHP's 'magic_quotes_gpc' setting, an unauthenticated attacker may be able to exploit this issue to manipulate database queries, leading to disclosure of sensitive information or attacks against the underlying database.
Note that the application's 'day.php' and 'week.php'' scripts are also reportedly affected by the same issue, although Nessus has not checked them.
Solution
Unknown at this time.
Plugin Details
File Name: mrbs_area_sql_injection.nasl
Configuration: Enable thorough checks
Supported Sensors: Nessus
Risk Information
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
Vulnerability Information
CPE: cpe:/a:mrbs:mrbs
Required KB Items: www/PHP, www/mrbs
Excluded KB Items: Settings/disable_cgi_scanning
Exploit Ease: Exploits are available
Exploited by Nessus: true