File: 2654.txt

package info (click to toggle)
snort 2.9.7.0-5
  • links: PTS, VCS
  • area: main
  • in suites: buster, sid, stretch
  • size: 55,000 kB
  • ctags: 38,464
  • sloc: ansic: 266,667; sh: 12,508; makefile: 2,908; yacc: 497; perl: 496; lex: 261; sed: 14
file content (65 lines) | stat: -rw-r--r-- 1,301 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
Rule:

--
Sid:
2654

--
Summary:
This event is generated when an attempt is made to exploit a known
vulnerability in the web application PHPNuke.

--
Impact:
SQL Injection is possible leading to a complete compromise of the data
in the application database.

--
Detailed Information:
This event is generated when an attempt is made to exploit a known 
vulnerability in the PHPNuke web application running on a server.

Insufficient checks are made on user input supplied to the script
"viewtopic.php", exploitation of this issue could present an attacker
with the opportunity to inject SQL code of their choosing into a
vulnerable system.

--
Affected Systems:
	PHPNuke 6.0
	PHPNuke 6.5 RC2

--
Attack Scenarios:
An attacker can supply code of their choice by including it in the
URI that calls on viewtopic.php.

--
Ease of Attack:
Simple. No exploit software required.

--
False Positives:
None known.

--
False Negatives:
None known.

--
Corrective Action:
Ensure the system is using an up to date version of the software and has
had all vendor supplied patches applied.

Consider reviewing the database permissions for the application.

--
Contributors:
Sourcefire Research Team
Ricky MacAtee <rmacatee@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>

--
Additional References:

--