Korean
<< Back
VID 21669
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description A version of PHP-Fusion which is older than version 6.00.107 is detected as running on the host. PHP-Fusion is a freely available content management system (CMS) written in PHP which uses MySQL. PHP-Fusion versions 6.00.106 and earlier are vulnerable to two vulnerabilities, which can be exploited by a remote attacker to conduct cross-site scripting or SQL injection attacks.

1) HTML Injection Vulnerability: Input passed to the BBcode "color" tag is not properly verified before being used in a post. This can be exploited to inject certain CSS (Cascading Style Sheets) code, which will be rendered in a user's browser session in context of an affected site when the malicious post is viewed.
2) SQL Injection Vulnerability: Input passed to the "msg_view" parameter of the "messages.php" code library isn't properly sanitized before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Exploitation requires that an attacker first authenticate.

* Note: This check solely relied on the version number of the PHP-Fusion installed on the remote Web server to assess this vulnerability, so this might be a false positive.

* References:
http://secunia.com/advisories/16096
http://www.osvdb.org/displayvuln.php?osvdb_id=18111

* Platforms Affected:
digitanium, PHP-Fusion versions 6.00.106 and earlier
Any operating system Any version
Recommendation No upgrade or patch available as of August 2005.

Upgrade to the latest version of PHP-Fusion, when new fixed version becomes available from the PHP-Fusion Web page http://sourceforge.net/projects/php-fusion/
Related URL CVE-2005-2401 (CVE)
Related URL 14332,14489 (SecurityFocus)
Related URL (ISS)