Summary
This host is running Redaxscript is prone to path disclosure and SQL injection vulnerabilities.
Impact
Successful exploitation will allow remote attackers to execute arbitrary queries to the database, compromise the application, access or modify sensitive data, or exploit various vulnerabilities in the underlying SQL database.
Impact Level: Application.
Solution
Upgrade to Redaxscript version 0.3.2a or later.
For updates refer to http://redaxscript.com/download
Insight
The flaws are due to
- Error in the '/templates/default/index.php', which reveals the full path of the script.
- Input passed to the 'id' and 'password' parameters in '/includes/password.php' is not properly sanitised before being returned to the user.
Affected
Redaxscript version 0.3.2
References
Severity
Classification
-
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- A Really Simple Chat Multiple SQL Injection Vulnerabilities
- ASAS Server End User Self Service (EUSS) SQL Injection Vulnerability
- Adobe ColdFusion Components (CFC) Denial Of Service Vulnerability
- AproxEngine Multiple Remote Input Validation Vulnerabilities
- Adobe ColdFusion Multiple Vulnerabilities-02 May-2014