Vulnerabilities > CVE-2004-1415 - Remote SQL Injection vulnerability in 2Bgal 2.4/2.5.1

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
PARTIAL
Availability impact
NONE
network
low complexity
ben3w
nessus
exploit available

Summary

SQL injection vulnerability in (1) disp_album.php and possibly (2) disp_img.php in 2Bgal 2.4 and 2.5.1 allows remote attackers to execute arbitrary SQL commands via the id_album parameter.

Vulnerable Configurations

Part Description Count
Application
Ben3W
2

Exploit-Db

description2BGal 2.5.1 Remote SQL Injection Vulnerability. CVE-2004-1415. Webapps exploit for php platform
idEDB-ID:25045
last seen2016-02-03
modified2004-12-22
published2004-12-22
reporterzib
sourcehttps://www.exploit-db.com/download/25045/
title2BGal 2.5.1 - Remote SQL Injection Vulnerability

Nessus

NASL familyCGI abuses
NASL id2BGAL_SQL_INJECTION.NASL
descriptionThe remote host appears to be running 2BGal, a photo gallery software written in PHP. There is a flaw in the
last seen2020-06-01
modified2020-06-02
plugin id16046
published2004-12-23
reporterThis script is Copyright (C) 2004-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/16046
title2BGal disp_album.php id_album Parameter SQL Injection
code
#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");

if(description)
{
 script_id(16046);
 script_cve_id("CVE-2004-1415");
 script_bugtraq_id(12083);
 script_version("1.16");
 
 script_name(english:"2BGal disp_album.php id_album Parameter SQL Injection");
 script_summary(english:"SQL Injection");
 
 script_set_attribute(attribute:"synopsis", value:
"The remote web server contains a PHP application that is susceptible
to a SQL injection attack." );

 script_set_attribute(attribute:"description", value:
"The remote host appears to be running 2BGal, a photo gallery
software written in PHP.

There is a flaw in the 'disp_album.php' script which fails to sanitize
input to the 'id_album' field. This may allow anyone to inject
arbitrary SQL commands. An attacker could exploit this to obtain
sensitive information and possibly gain administrative access to the
remote web application." );

 script_set_attribute(attribute:"see_also", value:
"https://seclists.org/bugtraq/2004/Dec/341" );

 script_set_attribute(attribute:"solution", value:
"The solution is unknown at this time." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
 script_set_attribute(attribute:"exploit_available", value:"true");

 script_set_attribute(attribute:"plugin_publication_date", value: "2004/12/23");
 script_set_attribute(attribute:"vuln_publication_date", value: "2004/12/22");
 script_cvs_date("Date: 2018/11/15 20:50:16");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_end_attributes();

 
 script_category(ACT_GATHER_INFO);
 
 script_copyright(english:"This script is Copyright (C) 2004-2018 Tenable Network Security, Inc.");
 script_family(english:"CGI abuses");

 script_dependencies("http_version.nasl");
 script_require_ports("Services/www", 80);
 script_exclude_keys("Settings/disable_cgi_scanning");
 script_require_keys("www/PHP");
 exit(0);
}

# Check starts here

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");


global_var port;

function check(dir)
{
  local_var r, buf;

  r = http_send_recv3(method: "GET", port:port, item:dir + "/disp_album.php?id_album=0+or+1=1");
  if (isnull(r)) exit(0);

  if( "disp_album.php?id_album=0 or 1=1" >< r[2] &&
       '<td class="barreinfo">' >< r[2] )
  {
  security_hole(port);
  set_kb_item(name: 'www/'+port+'/SQLInjection', value: TRUE);
  exit(0);
}
 
 
 return(0);
}

port = get_http_port(default:80, embedded: 0);

if ( ! can_host_php(port:port) ) exit(0);


foreach dir (cgi_dirs()) 
 {
  check(dir : dir );
 }