Vulnerability CVE-2006-1289


Published: 2006-03-19   Modified: 2012-02-12

Description:
Multiple SQL injection vulnerabilities in Milkeyway Captive Portal 0.1 and 0.1.1 allow remote attackers to execute arbitrary SQL commands via the (1) username, (2) password, (3) team, (4) level, (5) status, (6) teamname, and (7) teamlead parameters in (a) auth.php; the (8) username, (9) action, and (10) filter parameters in (b) authuser.php; the (11) username parameter in (c) utils.php; the (12) id and (13) date parameters in (d) traffic.php; the (14) username parameter in (e) userstatistics.php; and the (15) USERNAME and (16) PASSWORD parameters in a cookie to (f) chgpwd.php.

Type:

CWE-Other

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Milkeyway -> Milkeyway captive portal 

 References:
http://securitytracker.com/id?1015778
http://www.securityfocus.com/archive/1/427890/100/0/threaded
http://www.securityfocus.com/bid/17127
http://www.ush.it/team/ascii/hack-milkeway/advisory.txt
http://www.ush.it/team/ascii/hack-milkeway/milkeyway.txt
http://www.vupen.com/english/advisories/2006/0968
https://exchange.xforce.ibmcloud.com/vulnerabilities/25281
https://exchange.xforce.ibmcloud.com/vulnerabilities/25287

Copyright 2024, cxsecurity.com

 

Back to Top