Korean
<< Back
VID 21640
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The XOOPS program is vulnerable to multiple vulnerabilities which exist in versions prior to 2.0.12. XOOPS is a dynamic object oriented based open source portal system written in PHP. XOOPS versions prior to 2.0.12 are vulnerable to multiple input validation vulnerabilities, which can be exploited by remote attackers to conduct cross-site scripting and SQL injection attacks.

1) A SQL Injection Vulnerability: Input passed to the "xmlrpc.php" script isn't properly sanitized before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
2) Multiple Cross-Site Scripting Vulnerabilities: Input passed to the "order" and "cid" parameters of the "modules/newbb/edit.php", "modules/repository/comment_edit.php" scripts respectively isn't properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of a vulnerable site.

* References:
http://www.gulftech.org/?node=research&article_id=00086-06292005

* Platforms Affected:
XOOPS versions prior to 2.0.12
Microsoft Windows Any version
Linux Any version
Unix Any version
Recommendation Upgrade to the latest version of PEAR XML-RPC (1.3.1 or later), available from the PEAR XML_RPC Download Web page at http://pear.php.net/manual/en/introduction.php

-- AND --

Upgrade to the latest version of XOOPS (2.0.12 or later), available from the XOOPS Download Web site at http://www.xoops.org/modules/core/
Related URL CVE-2005-1921 (CVE)
Related URL 14094,14096 (SecurityFocus)
Related URL 21194 (ISS)