Summary
This host is installed with phpMyRecipes and is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attackers to execute arbitrary HTML or script code, inject or manipulate SQL queries in the back-end database, allowing for the manipulation or disclosure of arbitrary data and conduct other attacks.
Impact Level: Application
Solution
No Solution or patch is available as of 3rd January, 2014. Information regarding this issue will be updated once the solution details are available.
For updates refer to http://php-myrecipes.sourceforge.net
Insight
Multiple flaws are due to,
An improper validation of user supplied inputs passed via - 'r_id' parameter to index.php and textrecipe.php.
- 'from' parameter to ingredients.php.
- 'categories' parameter to dosearch.php.
- 'r_arecipes' parameter to domenutext.php.
- All the POST parameters.
All forms were missing CSRF tokens.
Affected
phpMyRecipes version 1.x.x
Detection
Send a crafted data via HTTP GET request and check whether it is able to read the cookie or not.
References
Updated on 2017-03-28