Vulnerabilities > CVE-2002-0216 - Remote SQL Injection vulnerability in Xoops 1.0Rc1

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
NONE
Availability impact
NONE
network
low complexity
xoops
nessus

Summary

userinfo.php in XOOPS 1.0 RC1 allows remote attackers to obtain sensitive information via a SQL injection attack in the "uid" parameter.

Vulnerable Configurations

Part Description Count
Application
Xoops
1

Nessus

NASL familyCGI abuses
NASL idXOOPS_PATH_DISCLOSURE.NASL
descriptionThe version of XOOPS installed on the remote host is affected by SQL injection, cross-site scripting, and information disclosure.
last seen2020-06-01
modified2020-06-02
plugin id11439
published2003-03-22
reporterThis script is Copyright (C) 2003-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/11439
titleXOOPS 1.0 RC1 Multiple Vulnerabilities
code
#
# (C) Tenable Network Security, Inc.
#

# Ref :
#  Date: 20 Mar 2003 19:58:55 -0000
#  From: "Gregory" Le Bras <[email protected]>
#  To: [email protected]
#  Subject: [SCSA-011] Path Disclosure Vulnerability in XOOPS
#
# This check will incidentally cover other flaws.


include("compat.inc");

if (description)
{
 script_id(11439);
 script_version("1.25");
 script_cvs_date("Date: 2018/11/15 20:50:19");
 script_cve_id("CVE-2002-0216", "CVE-2002-0217", "CVE-2002-1802");
 script_bugtraq_id(3977, 3978, 3981, 5785, 6344, 6393);

 script_name(english:"XOOPS 1.0 RC1 Multiple Vulnerabilities");
 script_summary(english:"Checks for XOOPS");

 script_set_attribute(attribute:"synopsis", value:
"The remote web server contains a PHP application that is prone to
multiple vulnerabilities." );
 script_set_attribute(attribute:"description", value:
"The version of XOOPS installed on the remote host is affected by SQL
injection, cross-site scripting, and information disclosure." );
 script_set_attribute(attribute:"see_also", value:"https://marc.info/?l=bugtraq&m=104820295115420&w=2");
 script_set_attribute(attribute:"see_also", value:"https://marc.info/?l=bugtraq&m=101232435812837&w=2" );
 script_set_attribute(attribute:"see_also", value:"https://marc.info/?l=bugtraq&m=101232476214247&w=2" );
 script_set_attribute(attribute:"solution", value:"Unknown at this time.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
  script_set_attribute(attribute:"exploit_available", value:"false");
 script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);

 script_set_attribute(attribute:"vuln_publication_date", value:"2002/01/29");
 script_set_attribute(attribute:"plugin_publication_date", value:"2003/03/22");

script_set_attribute(attribute:"plugin_type", value:"remote");
script_end_attributes();

 script_category(ACT_ATTACK);
 script_copyright(english:"This script is Copyright (C) 2003-2018 Tenable Network Security, Inc.");
 script_family(english:"CGI abuses");
 script_dependencie("xoops_detect.nasl");
 script_require_ports("Services/www", 80);
 script_require_keys("www/xoops");
 exit(0);
}

# The script code starts here
include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
include("webapp_func.inc");

port = get_http_port(default:80, php: 1);


# Test an install.
z = get_install_from_kb(appname: "xoops", port: port, exit_on_fail: 1);

d = z['dir'];

u = strcat(d, "/index.php?xoopsOption=nessus");
w = http_send_recv3(method:"GET", item: u, port:port, exit_on_fail: 1);
if (egrep(pattern:"Fatal error.* in <b>/", string: w[2]))
{
  if (report_verbosity <= 0)
    security_hole(port);
  else
  {
    e = get_vuln_report(items: u, port: port);
    security_hole(port: port, extra: e);
  }
  set_kb_item(name: 'www/'+port+'/XSS', value: TRUE);
  set_kb_item(name: 'www/'+port+'/SQLInjection', value: TRUE);
  exit(0);
}

Seebug

bulletinFamilyexploit
descriptionBugCVE: CAN-2002-0216 BUGTRAQ: 3977 Xoops是一个用面向对象的PHP写的开源、免费的web程序,它用MySQL作为后台数据库,可以运行于大多数的Unix和Linux系统。其userinfo.php脚本未能正确处理来自用户输入的SQL子句,攻击者可以利用某些技巧修改最终执行的SQL语句,导致敏感信息泄漏。 userinfo.php脚本没有检查用户输入的子句中是否包含特殊字符,比如提交如下URL请求(结尾有个分号) http://xoops-site/userinfo.php?uid=1; 将看到如下错误信息 -snip- MySQL Query Error: SELECT u.*, s.* FROM x_users u, x_users_status s WHERE u.uid=1; AND u.uid=s.uid Error number:1064 Error message: You have an error in your SQL syntax near '; AND u.uid=s.uid' at line 1 ERROR -snip- 这已经泄漏了很多敏感信息,攻击者可以利用这些信息进行SQL injection攻击,比如 http://xoops-site/userinfo.php?uid=1;[SQL Query] 参看http://www.owasp.org/projects/asac/iv-sqlinjection.shtml了解更多关于SQL injection攻击的信息。 1.0 RC1 临时解决方法: 如果您不能立刻安装补丁或者升级,建议您采取以下措施以降低威胁: * 修改程序代码过滤用户输入的特殊字符,或者SQL语句的整型变量也加上单引号,比如这个查询语句这样写就不会有问题: SELECT u.*, s.* FROM x_users u, x_users_status s WHERE u.uid='$uid' AND u.uid=s.uid 如果修改程序有困难,请暂时停止使用Xoops。 厂商补丁: Xoops ----- 目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本: <a href=http://xoops.sourceforge.net/ target=_blank>http://xoops.sourceforge.net/</a>
idSSV:4318
last seen2017-11-19
modified2008-10-25
published2008-10-25
reporterRoot
titleXoops远程SQLInjection漏洞