262
Silent-Storm Portal multiple input validation vulnerabilities
CGI
2004/10/05
Marc Ruef
marc dot ruef at computec dot ch
http://www.computec.ch
computec.ch
Marc Ruef
marc dot ruef at computec dot ch
http://www.computec.ch
computec.ch
2004/11/14
2.0
Check is inspired by the Nessus plugin (see Nessus ID listed in the sources). Corrected the plugin structure and added the accuracy values in 1.1. Improved the pattern matching and introduced the plugin changelog in 2.0
tcp
80
open|send GET /index.php?module=atk HTTP/1.0\n\n|sleep|close|pattern_exists HTTP/#.# ### *atk*
99
This plugin was written with the ATK Attack Editor.
Silent-Storm Portal
Other solutions
Cross Site Scripting
The remote host is running a vulnerable version of the Silent-Storm Portal. There are several input validation flaws available. There is a cross site scripting vulnerability affecting the file index.php and an attacker may corrupt the user database by creating a malformed username.
Upgrade the software to the latest version. The server and CGI suite should be deactivated or de-installed if not necessary. To make it harder to find the server the daemon could be configured to listen at another port (e.g. 8081). Try to prevent unwanted connection attempts by filtering traffic with firewalling. Alternation of the application banner can confuse an attacker and let him determine the wrong software.
Approx. 2 hours
Yes
http://www.securityfocus.com/bid/11284/exploit/
Yes
Yes
Medium
4
8
8
6
Medium
Nessus is able to do the same check.
11284
15403
Hacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427
http://www.computec.ch