Vulnerability CVE-2006-3543


Published: 2006-07-12   Modified: 2012-02-12

Description:
** DISPUTED ** Multiple SQL injection vulnerabilities in Invision Power Board (IPB) 1.x and 2.x allow remote attackers to execute arbitrary SQL commands via the (1) idcat and (2) code parameters in a ketqua action in index.php; the id parameter in a (3) Attach and (4) ref action in index.php; the CODE parameter in a (5) Profile, (6) Login, and (7) Help action in index.php; and the (8) member_id parameter in coins_list.php. NOTE: the developer has disputed this issue, stating that the "CODE attribute is never present in an SQL query" and the "'ketqua' [action] and file 'coin_list.php' are not standard IPB 2.x features". It is unknown whether these vectors are associated with an independent module or modification of IPB.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
Invision Power Board \"v1.X & 2.X\" SQL Injection
CrAzY CrAcKeR ho...
14.07.2006

Type:

CWE-Other

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Invision power services -> Invision power board 

 References:
http://securityreason.com/securityalert/1231
http://www.securityfocus.com/archive/1/439145/100/0/threaded
http://www.securityfocus.com/archive/1/439602/100/0/threaded
http://www.securityfocus.com/bid/18836

Copyright 2024, cxsecurity.com

 

Back to Top