Vulnerabilities > CVE-2004-1567 - Input Validation vulnerability in Silent-Storm Portal

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
silent-storm
nessus
exploit available

Summary

profile.php in Silent Storm Portal 2.1 and 2.2 allows remote attackers to gain privileges by setting the mail parameter to 1, which is the value for an administrator.

Vulnerable Configurations

Part Description Count
Application
Silent-Storm
2

Exploit-Db

descriptionSilent Storm Portal Multiple Vulnerabilities. CVE-2004-1567. Webapps exploit for php platform
idEDB-ID:565
last seen2016-01-31
modified2004-09-30
published2004-09-30
reporterCHT Security Research
sourcehttps://www.exploit-db.com/download/565/
titleSilent Storm Portal Multiple Vulnerabilities

Nessus

NASL familyCGI abuses
NASL idSILENTSTORM_XSS.NASL
descriptionThe remote host is running Silent-Storm, a web-based forum management software written in PHP. There are multiple input validation flaws in the remote version of this software : - There is a cross-site scripting vulnerability involving the
last seen2020-06-01
modified2020-06-02
plugin id15403
published2004-10-01
reporterThis script is Copyright (C) 2004-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/15403
titleSilent-Storm Portal Multiple Input Validation Vulnerabilities
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description) {
  script_id(15403);
  script_version("1.20");

  script_cve_id("CVE-2004-1566", "CVE-2004-1567");
  script_bugtraq_id(11284);

  script_name(english:"Silent-Storm Portal Multiple Input Validation Vulnerabilities");
  script_summary(english:"Checks for vulnerabilities in Silent-Storm Portal");
 
  script_set_attribute(  attribute:"synopsis",  value:
"The remote web server contains a PHP application that is affected by
multiple vulnerabilities."  );
  script_set_attribute(  attribute:"description",   value:
"The remote host is running Silent-Storm, a web-based forum management
software written in PHP.

There are multiple input validation flaws in the remote version of
this software :

  - There is a cross-site scripting vulnerability involving
    the 'module' parameter of the 'index.php' script.

  - The application fails to sanitize the 'mail' parameter
    to the 'profile.php' script, which could be abused to
    inject arbitrary data into the 'users.dat' database
    file and, for example, gain administrative access to
    the application."  );
  script_set_attribute(
    attribute:"see_also", 
    value:"https://seclists.org/bugtraq/2004/Sep/456"
  );
  script_set_attribute(
    attribute:"solution", 
    value:"Unknown at this time."
  );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
 script_set_attribute(attribute:"exploit_available", value:"false");
 script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);

 script_set_attribute(attribute:"plugin_publication_date", value: "2004/10/01");
 script_set_attribute(attribute:"vuln_publication_date", value: "2004/09/30");
 script_cvs_date("Date: 2018/11/15 20:50:18");
  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_end_attributes();
 
  script_category(ACT_ATTACK);
  script_copyright(english:"This script is Copyright (C) 2004-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_family(english:"CGI abuses");

  script_dependencie("http_version.nasl");
  script_require_ports("Services/www", 80);
  script_exclude_keys("Settings/disable_cgi_scanning");

  exit(0);
}

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");


port = get_http_port(default:80, embedded: 0);

test_cgi_xss(port: port, cgi: "/index.php", qs: "module=<script>foo</script>",
    pass_str: "<script>foo</script>", ctrl_re: "copyright silent-storm\.co.uk",
    high_risk: TRUE);