Synopsis
The remote web server contains an ASP script that is susceptible to a SQL injection attack.
Description
The version of Snitz Forums 2000 hosted on the remote host fails to sanitize input to the 'X-Forwarded-For' header in the 'active.asp' script when called with the 'AllRead' POST parameter set to 'Y' before using it to construct a database query.
An unauthenticated, remote attacker can leverage this issue to manipulate SQL queries and, for example, modify data or uncover sensitive information from the application's database.
Solution
Unknown at this time.
Plugin Details
File Name: snitz_x_forwarded_for_sqli.nasl
Configuration: Enable thorough checks
Supported Sensors: Nessus
Vulnerability Information
Required KB Items: www/snitz
Excluded KB Items: Settings/disable_cgi_scanning
Exploit Ease: Exploits are available
Exploited by Nessus: true
Vulnerability Publication Date: 1/6/2010
Reference Information
BID: 37637