Vulnerabilities > CVE-2004-1406 - Unspecified vulnerability in Ikonboard.Com Ikonboard

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
ikonboard-com
nessus
exploit available

Summary

SQL injection vulnerability in ikonboard.cgi in Ikonboard 3.1.0 through 3.1.3 allows remote attackers to inject arbitrary SQL commands via the (1) st or (2) keywords parameter.

Exploit-Db

descriptionIkonboard 3.x Multiple Remote SQL Injection Vulnerabilities. CVE-2004-1406 . Webapps exploit for cgi platform
idEDB-ID:24986
last seen2016-02-03
modified2004-12-16
published2004-12-16
reporteranonymous
sourcehttps://www.exploit-db.com/download/24986/
titleIkonboard 3.x - Multiple Remote SQL Injection Vulnerabilities

Nessus

NASL familyCGI abuses
NASL idIKONBOARD_SQL_INJECT.NASL
descriptionThe remote server is running IkonBoard, a Web Bulletin Board System written in Perl. The remote version of this software fails to sanitize user-supplied input to multiple variables in the
last seen2020-06-01
modified2020-06-02
plugin id15986
published2004-12-16
reporterThis script is Copyright (C) 2004-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/15986
titleIkonboard ikonboard.cgi Multiple Parameter SQL Injection
code
#
# (C) Tenable Network Security, Inc.
# 


include("compat.inc");

if(description)
{
 script_id(15986);
 script_version ("1.17");

 script_cve_id("CVE-2004-1406");
 script_bugtraq_id(11982);
 script_xref(name:"Secunia", value:"13513");
 
 script_name(english:"Ikonboard ikonboard.cgi Multiple Parameter SQL Injection");
 script_summary(english:"Checks for Ikonboard.cgi");
  
 script_set_attribute(attribute:"synopsis", value:
"The remote web server is hosting a Perl application that is affected
by multiple SQL injection vulnerabilities." );
 script_set_attribute(attribute:"description", value:
"The remote server is running IkonBoard, a Web Bulletin Board System
written in Perl.

The remote version of this software fails to sanitize user-supplied
input to multiple variables in the 'ikonboard.cgi' script.  An
attacker can exploit this flaw to launch SQL injection attacks." );
 script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2004/Dec/190" );
 script_set_attribute(attribute:"solution", value:
"There is no known solution at this time." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
 script_set_attribute(attribute:"exploit_available", value:"true");

 script_set_attribute(attribute:"plugin_publication_date", value: "2004/12/16");
 script_set_attribute(attribute:"vuln_publication_date", value: "2004/12/16");
 script_cvs_date("Date: 2018/11/15 20:50:17");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_set_attribute(attribute:"cpe", value:"cpe:/a:ikonboard.com:ikonboard");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);
 
 script_copyright(english:"This script is Copyright (C) 2004-2018 Tenable Network Security, Inc.");
 script_family(english:"CGI abuses");

 script_dependencie("http_version.nasl");
 script_require_ports("Services/www", 80);
 script_exclude_keys("Settings/disable_cgi_scanning");
 exit(0);
}


include("global_settings.inc");
include("misc_func.inc");
include("http.inc");


port = get_http_port(default:80);


foreach d (cgi_dirs())
{
 res = http_send_recv3(method:"GET", item:d+"/ikonboard.cgi?act=ST&f=1&t=1&hl=nessus&st='", port:port);
 if (isnull(res)) exit(1, "The web server on port "+port+" failed to respond.");

 if ( "SELECT * FROM ib_forum_posts WHERE TOPIC_ID = '1' AND QUEUED <> '1' ORDER BY POST_DATE ASC LIMIT" >< res[2])
 {
   security_hole(port:port);
   set_kb_item(name:'www/'+port+'/SQLInjection',value:TRUE);
   exit(0);
 }
}