Summary
This host is installed with Ganesha Digital Library and is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow attacker to execute arbitrary HTML and script code, manipulate SQL commands in backend database and read arbitrary files.
Impact Level: Application
Solution
No solution or patch is available as of 30th January, 2015. Information regarding this issue will be updated once the solution details are available.
For updates refer to http://kmrg.itb.ac.id
Insight
Multiple flaws are due to improper sanitation of user supplied input via 'newlang' and 'newtheme' parameters to index.php and gdl.php, 'id' parameter to download.php and 'keyword' parameter to gdl.php scripts.
Affected
Ganesha Digital Library version 4.2, Other versions may also be affected.
Detection
Send a crafted data via HTTP GET request and check whether it is able to read cookie or not.
References
Severity
Classification
-
CVSS Base Score: 7.1
AV:N/AC:H/Au:N/C:C/I:C/A:N
Related Vulnerabilities
- Ajax File and Image Manager 'data.php' PHP Code Injection Vulnerability
- ArticleSetup Multiple Cross-Site Scripting and SQL Injection Vulnerabilities
- AWStats Totals 'sort' Parameter Remote Command Execution Vulnerabilities
- Atutor AContent Multiple SQL Injection and XSS Vulnerabilities
- Admbook PHP Code Injection Flaw