Vulnerabilities > CVE-2005-1788 - Unspecified vulnerability in Hosting Controller Hosting Controller 6.1Hotfix2.0

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
hosting-controller
nessus
exploit available

Summary

SQL injection vulnerability in resellerresources.asp in Hosting Controller 6.1 Hotfix 2.0 allows remote attackers to execute arbitrary SQL commands via the jresourceid parameter.

Vulnerable Configurations

Part Description Count
Application
Hosting_Controller
1

Exploit-Db

  • descriptionHosting Controller 6.1 resellerresources.asp jresourceid Parameter SQL Injection. CVE-2005-1788. Webapps exploit for asp platform
    idEDB-ID:25753
    last seen2016-02-03
    modified2005-05-28
    published2005-05-28
    reporterGrayHatz Security Group
    sourcehttps://www.exploit-db.com/download/25753/
    titleHosting Controller 6.1 resellerresources.asp jresourceid Parameter SQL Injection
  • descriptionHosting Controller 6.1 plandetails.asp Information Disclosure. CVE-2005-1788. Webapps exploit for asp platform
    idEDB-ID:25754
    last seen2016-02-03
    modified2005-05-28
    published2005-05-28
    reporterGrayHatz Security Group
    sourcehttps://www.exploit-db.com/download/25754/
    titleHosting Controller 6.1 plandetails.asp Information Disclosure

Nessus

NASL familyCGI abuses
NASL idHOSTING_CONTROLLER_RESELLER_PLAN_VULNS.NASL
descriptionAccording to its version number, the version of Hosting Controller on the remote host suffers from multiple vulnerabilities: - An authenticated user can modify another user
last seen2020-06-01
modified2020-06-02
plugin id18400
published2005-05-30
reporterThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/18400
titleHosting Controller < 6.1 Hotfix 2.1 Multiple Vulnerabilities
code
#
# (C) Tenable Network Security, Inc.
#



include("compat.inc");

if (description) {
  script_id(18400);
  script_version("1.25");

  script_cve_id("CVE-2005-1784", "CVE-2005-1788", "CVE-2005-2077");
  script_bugtraq_id(13806, 13816, 13829, 14080);

  name["english"] = "Hosting Controller < 6.1 Hotfix 2.1 Multiple Vulnerabilities";
  script_name(english:name["english"]);
 
 script_set_attribute(attribute:"synopsis", value:
"The remote web server contains an ASP application with multiple flaws." );
 script_set_attribute(attribute:"description", value:
"According to its version number, the version of Hosting Controller on
the remote host suffers from multiple vulnerabilities:

  - An authenticated user can modify another user's profile, 
    even an admin's, recover his/her password, and then gain 
    access to the affected application as that user.

  - An authenticated user can view, edit, and even delete 
    reseller add-on plans. 

  - The scripts 'sendpassword.asp' and 'error.asp' are prone
    to cross-site scripting attacks." );
 script_set_attribute(attribute:"see_also", value:"http://securitytracker.com/alerts/2005/May/1014062.html" );
 script_set_attribute(attribute:"see_also", value:"http://securitytracker.com/alerts/2005/May/1014071.html" );
 script_set_attribute(attribute:"see_also", value:"https://www.securityfocus.com/archive/1/403571/30/0/threaded" );
 script_set_attribute(attribute:"solution", value:
"Upgrade to version 6.1 if necessary and apply Hotfix 2.1." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:F/RL:U/RC:ND");
 script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
 script_set_attribute(attribute:"exploit_available", value:"true");
 script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);

 script_set_attribute(attribute:"plugin_publication_date", value: "2005/05/30");
 script_set_attribute(attribute:"vuln_publication_date", value: "2005/05/27");
 script_cvs_date("Date: 2018/11/15 20:50:17");
script_set_attribute(attribute:"plugin_type", value:"local");
script_end_attributes();

 
  summary["english"] = "Checks for multiple vulnerabilities in Hosting Controller < 6.1 hotfix 2.1";
  script_summary(english:summary["english"]);
 
  script_category(ACT_GATHER_INFO);
  script_family(english:"CGI abuses");

  script_copyright(english:"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.");

  script_dependencies("hosting_controller_detect.nasl");
  script_require_keys("SMB/Registry/Enumerated");
  script_require_ports("Services/www", 8887);

  exit(0);
}


include("global_settings.inc");
include("misc_func.inc");


# Check for Hosting Controller installs.
ports = add_port_in_list(list:get_kb_list("Services/www"), port:8887);
foreach port (ports) {
  ver = get_kb_item(string("www/", port, "/hosting_controller"));
  if (ver) {
    # nb: versions <= 6.1 hotfix 2.0 are vulnerable.
    if (ver =~ "^(2002|[0-5]\.|6\.(0|1($| hotfix ([01]\.|2\.0))))") {
      security_warning(port);
      set_kb_item(name: 'www/'+port+'/XSS', value: TRUE);
      if (!thorough_tests) exit(0);
    }
  }
}