Summary
This host is running MCshoutbox and is prone to multiple SQL Injection and Cross-Site Scripting vulnerabilities.
Impact
Successful exploitation will allow attacker to bypass the authentication mechanism when 'magic_quotes_gpc' is disabled or can cause arbitrary code execution by uploading the shell code in the context of the web application.
Impact Level: Application
Solution
No solution or patch was made available for at least one year since disclosure of this vulnerability. Likely none will be provided anymore.
General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one.
Insight
- Input passed via the 'loginerror' to admin_login.php is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in the context of an affected site.
- Input passed via the 'username' and 'password' parameters to scr_login.php is not properly sanitised before being used in an SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
- The application does not properly check extensions of uploaded 'smilie' image files. This can be exploited to upload and execute arbitrary PHP code.
Affected
MCshoutbox version 1.1 on all running platform
References
Updated on 2017-03-28
Severity
Classification
-
CVE CVE-2009-3714, CVE-2009-3715 -
CVSS Base Score: 6.8
AV:N/AC:M/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- Adobe ColdFusion Multiple Path Disclosure Vulnerabilities
- AjaXplorer Remote Command Injection and Local File Disclosure Vulnerabilities
- Apache Tiles Multiple XSS Vulnerability
- Allegro RomPager HTTP Referer Header Cross Site Scripting Vulnerability
- Apache Web Server Linefeed Memory Allocation Denial Of Service Vulnerability