Summary
The host is running Energine and is prone to SQL injection vulnerability.
Impact
Successful exploitation will allow attacker to cause SQL Injection attack and gain sensitive information.
Impact Level: Application
Solution
No solution or patch was made available for at least one year since disclosure of this vulnerability. Likely none will be provided anymore.
General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one.
Insight
The flaw is caused by improper validation of user-supplied input via the 'NRGNSID' cookie to 'index.php', which allows attacker to manipulate SQL queries by injecting arbitrary SQL code.
Affected
Energine Version 2.3.8 and prior.
References
Severity
Classification
-
CVE CVE-2010-4185 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- A-Blog 'sources/search.php' SQL Injection Vulnerability
- AjaxPortal 'di.php' File Inclusion Vulnerability
- ArticleFR CMS 'id' Parameter SQL Injection Vulnerability
- AlienVault Open Source SIEM (OSSIM) 'timestamp' Parameter Directory Traversal Vulnerability
- AIOCP 'cp_html2xhtmlbasic.php' Remote File Inclusion Vulnerability