Vulnerability CVE-2011-3838


Published: 2011-12-24   Modified: 2012-02-13

Description:
Multiple SQL injection vulnerabilities in Wuzly 2.0 allow remote attackers to execute arbitrary SQL commands via the (1) u parameter to fp.php, (2) epage parameter to newpage.php, (3) epost parameter to newpost.php, and (4) username parameter to login.php in admin/; or the (5) username parameter to mobile/login.php.

Type:

CWE-89

(Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection'))

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Wuzly -> Wuzly 

 References:
http://xforce.iss.net/xforce/xfdb/71904
http://secunia.com/secunia_research/2011-88/
http://secunia.com/advisories/46163
http://osvdb.org/77919
http://osvdb.org/77918
http://osvdb.org/77917
http://osvdb.org/77916
http://osvdb.org/77915

Copyright 2024, cxsecurity.com

 

Back to Top