Vulnerability CVE-2006-1638


Published: 2006-04-06   Modified: 2012-02-12

Description:
Multiple SQL injection vulnerabilities in aWebBB 1.2 allow remote attackers to execute arbitrary SQL commands via the (1) Username parameter to (a) accounts.php, (b) changep.php, (c) editac.php, (d) feedback.php, (e) fpass.php, (f) login.php, (g) post.php, (h) reply.php, or (i) reply_log.php; (2) p parameter to (j) dpost.php; (3) c parameter to (k) list.php or (l) ndis.php; or (12) q parameter to (m) search.php.

Type:

CWE-Other

CVSS2 => (AV:N/AC:H/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5.1/10
6.4/10
4.9/10
Exploit range
Attack complexity
Authentication
Remote
High
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Aweb labs -> Awebbb 

 References:
http://evuln.com/vulns/117/summary.html
http://www.securityfocus.com/archive/1/431064/100/0/threaded
http://www.securityfocus.com/bid/17352
http://www.vupen.com/english/advisories/2006/1197
https://exchange.xforce.ibmcloud.com/vulnerabilities/25587

Copyright 2024, cxsecurity.com

 

Back to Top