Summary
This host is running Seagull and is prone to SQL injection and multiple remote file inclusion vulnerabilities.
Impact
Successful exploitation will allow attacker to execute arbitrary code on the vulnerable Web server and to execute arbitrary SQL commands.
Impact Level: Application.
Solution
No solution or patch was made available for at least one year since disclosure of this vulnerability. Likely none will be provided anymore.
General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one.
Insight
Multiple flaws are due to:
- An error in the 'Config/Container.php', which is not properly validating the input passed to 'includeFile' parameter.
- An error in the 'fog/lib/pear/HTML/QuickForm.php', which is not properly validating the input passed to 'includeFile' parameter.
- An error in the 'fog/lib/pear/DB/NestedSet.php', which is not properly validating the input passed to 'driverpath' parameter.
- An error in the 'fog/lib/pear/DB/NestedSet/Output.php', which is not properly validating the input passed to 'path' parameter.
- An SQL injection error in 'index.php', which allows remote attackers to execute arbitrary SQL commands via the frmQuestion parameter in a retrieve action, in conjunction with a user/password PATH_INFO.
Affected
Seagull version 0.6.7
References
Severity
Classification
-
CVE CVE-2010-3209, CVE-2010-3212 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- Ajax File and Image Manager 'data.php' PHP Code Injection Vulnerability
- Apache Struts2 Redirection and Security Bypass Vulnerabilities
- AlienVault OSSIM 'date_from' Parameter Multiple SQL Injection Vulnerabilities
- Atutor AContent Multiple SQL Injection and XSS Vulnerabilities
- AlienVault OSSIM Multiple Remote Code Execution Vulnerabilities