Vulnerabilities > CVE-2005-1548 - SQL Injection vulnerability in Advanced Guestbook Advanced Guestbook 2.3.1

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
advanced-guestbook
nessus

Summary

SQL injection vulnerability in index.php in Advanced Guestbook 2.3.1 allows remote attackers to execute arbitrary SQL commands via the entry parameter.

Vulnerable Configurations

Part Description Count
Application
Advanced_Guestbook
1

Nessus

NASL familyCGI abuses
NASL idADVANCED_GUESTBOOK.NASL
descriptionThe remote host is running Advanced Guestbook - a guestbook written in PHP. The remote version of this software contains an input validation flaw leading to a SQL injection vulnerability. An attacker may exploit this flaw to execute arbitrary commands against the remote database.
last seen2020-06-01
modified2020-06-02
plugin id18217
published2005-05-10
reporterCopyright (C) 2005-2018 Josh Zlatin-Amishav
sourcehttps://www.tenable.com/plugins/nessus/18217
titleAdvanced Guestbook index.php entry Parameter SQL Injection
code
#
# This script was written by Josh Zlatin-Amishav
#
# This script is released under the GNU GPLv2
#


include("compat.inc");

if(description)
{
 script_id(18217);
 script_cve_id("CVE-2005-1548");
 script_bugtraq_id(13548);
 script_version("1.23");

 script_name(english:"Advanced Guestbook index.php entry Parameter SQL Injection");

 script_summary(english:"Checks for a SQL injection attack in Advanced Guestbook");

 script_set_attribute(attribute:"synopsis", value:
"The remote host is running a web application written in PHP which is
affected by a SQL injection vulnerability." );
 script_set_attribute(attribute:"description", value:
"The remote host is running Advanced Guestbook - a guestbook written in PHP.

The remote version of this software contains an input validation flaw leading
to a SQL injection vulnerability. An attacker may exploit this flaw to execute
arbitrary commands against the remote database." );
 script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2005/May/100" );
 script_set_attribute(attribute:"solution", value:
"There is no known solution at this time." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:F/RL:U/RC:ND");
 script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
 script_set_attribute(attribute:"exploit_available", value:"true");

 script_set_attribute(attribute:"plugin_publication_date", value: "2005/05/10");
 script_set_attribute(attribute:"vuln_publication_date", value: "2005/05/08");
 script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/12");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_end_attributes();


 script_category(ACT_GATHER_INFO);

 script_family(english:"CGI abuses");
 script_copyright(english:"Copyright (C) 2005-2020 Josh Zlatin-Amishav");

 script_dependencies("http_version.nasl");
 script_require_ports("Services/www", 80);
 script_exclude_keys("Settings/disable_cgi_scanning");
 exit(0);
}

include("http_func.inc");
include("http_keepalive.inc");

port = get_http_port(default:80, embedded:TRUE);
if ( ! port ) exit(0);

function check(url)
{
 local_var req, res;

 req = http_get(item:url +"/index.php?entry='", port:port);
 res = http_keepalive_send_recv(port:port, data:req);
 if ( res == NULL ) exit(0);
 if (  "Query Error" >< res && '1064 You have an error in your SQL syntax.' >< res  )
 {
        security_hole(port);
	set_kb_item(name: 'www/'+port+'/SQLInjection', value: TRUE);
        exit(0);
 }
}

foreach dir ( cgi_dirs() )
{
  check(url:dir);
}