Summary
This host is running ColdGen ColdUserGroup and is prone to cross site scripting and SQL injection vulnerabilities.
Impact
Successful exploitation could allow an attacker to steal cookie -based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
Impact Level: Application
Solution
No solution or patch was made available for at least one year since disclosure of this vulnerability. Likely none will be provided anymore.
General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one.
Insight
- Input passed via the 'Keywords' POST parameter when performing a search is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
- Input passed via the 'LibraryID' to index.cfm is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
Affected
ColdGen ColdUserGroup 1.06
References
Severity
Classification
-
CVE CVE-2010-4913, CVE-2010-4916 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- Astium VoIP PBX SQL Injection Vulnerability
- aflog Cookie-Based Authentication Bypass Vulnerability
- Allegro RomPager `Misfortune Cookie` Vulnerability
- AlstraSoft AskMe Pro 'forum_answer.php' and 'profile.php' Multiple SQL Injection Vulnerabilities
- Awstats Configuration File Remote Arbitrary Command Execution Vulnerability