Vulnerabilities > CVE-2005-2028 - Unspecified vulnerability in Mercuryboard Message Board 1.1.4

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
mercuryboard
nessus
exploit available

Summary

SQL injection vulnerability in index.php for MercuryBoard 1.1.4 and earlier allows remote attackers to execute arbitrary SQL commands via the User-Agent HTTP header.

Vulnerable Configurations

Part Description Count
Application
Mercuryboard
1

Exploit-Db

descriptionMercuryBoard <= 1.1.4 SQL Injection Exploit. CVE-2005-2028. Webapps exploit for php platform
idEDB-ID:1058
last seen2016-01-31
modified2005-06-21
published2005-06-21
reporterRusH
sourcehttps://www.exploit-db.com/download/1058/
titleMercuryBoard <= 1.1.4 - SQL Injection Exploit

Nessus

NASL familyCGI abuses
NASL idMERCURYBOARD_USER_AGENT_SQL_INJECTION.NASL
descriptionThe remote host is running MercuryBoard, an open source bulletin board system that uses PHP and MySQL. The installed version of MercuryBoard fails to remove malicious data from a User-Agent header before using it in a database query, making it prone to SQL injection attacks. An authenticated attacker can exploit this flaw to modify database updates, possibly modifying data and launching attacks against the underlying database.
last seen2020-06-01
modified2020-06-02
plugin id18541
published2005-06-21
reporterThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/18541
titleMercuryBoard User-Agent SQL Injection
code
#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");

if (description) {
  script_id(18541);
  script_version("1.19");

  script_cve_id("CVE-2005-2028");
  script_bugtraq_id(14015);

  script_name(english:"MercuryBoard User-Agent SQL Injection");
 
 script_set_attribute(attribute:"synopsis", value:
"The remote web server contains a PHP script that is affected by a SQL
injection vulnerability." );
 script_set_attribute(attribute:"description", value:
"The remote host is running MercuryBoard, an open source bulletin board
system that uses PHP and MySQL. 

The installed version of MercuryBoard fails to remove malicious data
from a User-Agent header before using it in a database query, making
it prone to SQL injection attacks.  An authenticated attacker can
exploit this flaw to modify database updates, possibly modifying data
and launching attacks against the underlying database." );
 script_set_attribute(attribute:"see_also", value:"https://www.securityfocus.com/archive/1/402929/30/0/" );
 script_set_attribute(attribute:"solution", value:
"Unknown at this time." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:F/RL:U/RC:ND");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");
 script_set_attribute(attribute:"plugin_publication_date", value: "2005/06/21");
 script_set_attribute(attribute:"vuln_publication_date", value: "2005/06/21");
 script_cvs_date("Date: 2018/11/15 20:50:17");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe", value: "cpe:/a:mercuryboard:mercuryboard_message_board");
script_end_attributes();

  script_summary(english:"Checks for User-Agent remote SQL injection vulnerability in MercuryBoard");
  script_category(ACT_ATTACK);
  script_family(english:"CGI abuses");
  script_copyright(english:"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.");
  script_dependencies("http_version.nasl");
  script_exclude_keys("Settings/disable_cgi_scanning");
  script_require_ports("Services/www", 80);
  script_require_keys("www/PHP");
  exit(0);
}

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");


port = get_http_port(default:80);
if (!can_host_php(port:port)) exit(0);


# Loop through CGI directories.
foreach dir (cgi_dirs()) {
  # Try to exploit the flaw.
  w = http_send_recv3(method:"GET", port: port, item: dir+"/index.php",
    add_headers: make_array("User-Agent", SCRIPT_NAME+"'"));
  if (isnull(w)) exit(1, "The web server on port "+port+" did not answer");
  res = w[2];
  # There's a problem if...
  if (
    # It looks like MercuryBoard and...
    "<title>MercuryBoard Error</title>" >< res && 
    # We see a syntax error with our script name.
    egrep(string:res, pattern:string("Query.+REPLACE INTO.+'", SCRIPT_NAME, "''"))
  ) { 
    security_warning(port);
    set_kb_item(name: 'www/'+port+'/SQLInjection', value: TRUE);
    exit(0);
  }
}