Vulnerabilities > CVE-2004-1566 - Unspecified vulnerability in Silent-Storm Portal 2.1/2.2

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN

Summary

Cross-site scripting (XSS) vulnerability in index.php in Silent Storm Portal 2.1 and 2.2 allows remote attackers to execute arbitrary web script or HTML via the module parameter.

Vulnerable Configurations

Part Description Count
Application
Silent-Storm
2

Nessus

NASL familyCGI abuses
NASL idSILENTSTORM_XSS.NASL
descriptionThe remote host is running Silent-Storm, a web-based forum management software written in PHP. There are multiple input validation flaws in the remote version of this software : - There is a cross-site scripting vulnerability involving the
last seen2020-06-01
modified2020-06-02
plugin id15403
published2004-10-01
reporterThis script is Copyright (C) 2004-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/15403
titleSilent-Storm Portal Multiple Input Validation Vulnerabilities
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description) {
  script_id(15403);
  script_version("1.20");

  script_cve_id("CVE-2004-1566", "CVE-2004-1567");
  script_bugtraq_id(11284);

  script_name(english:"Silent-Storm Portal Multiple Input Validation Vulnerabilities");
  script_summary(english:"Checks for vulnerabilities in Silent-Storm Portal");
 
  script_set_attribute(  attribute:"synopsis",  value:
"The remote web server contains a PHP application that is affected by
multiple vulnerabilities."  );
  script_set_attribute(  attribute:"description",   value:
"The remote host is running Silent-Storm, a web-based forum management
software written in PHP.

There are multiple input validation flaws in the remote version of
this software :

  - There is a cross-site scripting vulnerability involving
    the 'module' parameter of the 'index.php' script.

  - The application fails to sanitize the 'mail' parameter
    to the 'profile.php' script, which could be abused to
    inject arbitrary data into the 'users.dat' database
    file and, for example, gain administrative access to
    the application."  );
  script_set_attribute(
    attribute:"see_also", 
    value:"https://seclists.org/bugtraq/2004/Sep/456"
  );
  script_set_attribute(
    attribute:"solution", 
    value:"Unknown at this time."
  );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
 script_set_attribute(attribute:"exploit_available", value:"false");
 script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);

 script_set_attribute(attribute:"plugin_publication_date", value: "2004/10/01");
 script_set_attribute(attribute:"vuln_publication_date", value: "2004/09/30");
 script_cvs_date("Date: 2018/11/15 20:50:18");
  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_end_attributes();
 
  script_category(ACT_ATTACK);
  script_copyright(english:"This script is Copyright (C) 2004-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_family(english:"CGI abuses");

  script_dependencie("http_version.nasl");
  script_require_ports("Services/www", 80);
  script_exclude_keys("Settings/disable_cgi_scanning");

  exit(0);
}

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");


port = get_http_port(default:80, embedded: 0);

test_cgi_xss(port: port, cgi: "/index.php", qs: "module=<script>foo</script>",
    pass_str: "<script>foo</script>", ctrl_re: "copyright silent-storm\.co.uk",
    high_risk: TRUE);