After a SiteLock scan and then contacting my host about any issues they sent the info below. Does anyone know how I go about fixing the issue? Is it an issue based upon being an "experimental script?" I searched here but can't find anything. (And is SiteLock a "reputable" scanner?)
Quote:
An attacker may be able to exploit this issue to bypass authentication, read confidential data, modify the remote database, or even take control of the remote operating system.
Note that this script is experimental and may be prone to false positives.
Solution: Modify the affected CGI scripts so that they properly escape arguments.
Technical Details: Using the GET HTTP method, SiteLock App Scan found that :+ The following resources may be vulnerable to blind SQL injection (time
based) :+ The 'do' parameter of the /forum/photoplog/search.php CGI
:/forum/photoplog/search.php?query=&submit=&securitytoken=guest&do=p rocess'));SELECT%20pg_sleep(3);-
Please check your affected CGI script and modify them so that the issue can be resolved.
|