Vulnerabilities > CVE-2004-1588 - Unspecified vulnerability in Gosmart Message Board
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN gosmart
nessus
Summary
SQL injection vulnerability in GoSmart Message Board allows remote attackers to execute arbitrary SQL code via the (1) QuestionNumber and Category parameters to Forum.asp or (2) Username and Password parameter to Login_Exec.asp.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Nessus
NASL family | CGI abuses |
NASL id | GOSMART_MESSAGE_BOARD.NASL |
description | The remote host is running GoSmart message board, a bulletin board manager written in ASP. The remote version of this software contains multiple flaws, due to a failure of the application to properly sanitize user-supplied input. It is also affected by a cross-site scripting vulnerability. As a result of this vulnerability, it is possible for a remote attacker to create a malicious link containing script code that will be executed in the browser of an unsuspecting user when followed. Furthermore, this version is vulnerable to SQL injection flaws that let an attacker inject arbitrary SQL commands. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 15451 |
published | 2004-10-11 |
reporter | This script is Copyright (C) 2004-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/15451 |
title | GoSmart Message Board Multiple Vulnerabilities (SQLi, XSS) |
code |
|
References
- http://marc.info/?l=bugtraq&m=109751522823011&w=2
- http://marc.info/?l=bugtraq&m=109751522823011&w=2
- http://secunia.com/advisories/12790/
- http://secunia.com/advisories/12790/
- http://www.securityfocus.com/bid/11361
- http://www.securityfocus.com/bid/11361
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17678
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17678