This host is running ColdGen ColdUserGroup and is prone to cross site scripting and SQL injection vulnerabilities.
Successful exploitation could allow an attacker to steal cookie -based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. Impact Level: Application
No solution or patch was made available for at least one year since disclosure of this vulnerability. Likely none will be provided anymore. General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one.
- Input passed via the 'Keywords' POST parameter when performing a search is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. - Input passed via the 'LibraryID' to index.cfm is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
ColdGen ColdUserGroup 1.06