Vulnerabilities > CVE-2005-1598 - Unspecified vulnerability in Invision Power Services Invision Board and Invision Power Board
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
SQL injection vulnerability in Invision Power Board (IPB) 2.0.3 and earlier allows remote attackers to execute arbitrary SQL commands via a crafted cookie password hash (pass_hash) that modifies the internal $pid variable.
Vulnerable Configurations
Exploit-Db
description Invision Power Board (IP.Board) < 2.0.3 - Multiple Vulnerabilities. CVE-2005-1597,CVE-2005-1598. Webapps exploit for PHP platform id EDB-ID:43824 last seen 2018-01-24 modified 2015-05-05 published 2015-05-05 reporter Exploit-DB source https://www.exploit-db.com/download/43824/ title Invision Power Board (IP.Board) < 2.0.3 - Multiple Vulnerabilities description Invision Power Board <= 2.0.3 Login.PHP SQL Injection Exploit. CVE-2005-1598. Webapps exploit for php platform file exploits/php/webapps/1013.pl id EDB-ID:1013 last seen 2016-01-31 modified 2005-05-26 platform php port published 2005-05-26 reporter Petey Beege source https://www.exploit-db.com/download/1013/ title Invision Power Board <= 2.0.3 Login.PHP SQL Injection Exploit type webapps
Nessus
NASL family | CGI abuses |
NASL id | INVISION_POWER_BOARD_2_0_4.NASL |
description | According to its banner, the version of Invision Power Board on the remote host suffers from multiple vulnerabilities : - SQL Injection Vulnerability The application fails to sanitize user-input supplied through the |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 18203 |
published | 2005-05-09 |
reporter | This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/18203 |
title | Invision Power Board < 2.0.4 Multiple Vulnerabilities (SQLi, XSS) |
code |
|
References
- http://forums.invisionpower.com/index.php?showtopic=168016
- http://forums.invisionpower.com/index.php?showtopic=168016
- http://marc.info/?l=bugtraq&m=111539908705851&w=2
- http://marc.info/?l=bugtraq&m=111539908705851&w=2
- http://marc.info/?l=bugtraq&m=111712587206834&w=2
- http://marc.info/?l=bugtraq&m=111712587206834&w=2
- http://secunia.com/advisories/15265
- http://secunia.com/advisories/15265
- http://securitytracker.com/id?1013907
- http://securitytracker.com/id?1013907
- http://securitytracker.com/id?1014499
- http://securitytracker.com/id?1014499
- http://www.gulftech.org/?node=research&article_id=00073-05052005
- http://www.gulftech.org/?node=research&article_id=00073-05052005
- http://www.osvdb.org/16297
- http://www.osvdb.org/16297
- http://www.securiteam.com/exploits/5GP0E2KFQQ.html
- http://www.securiteam.com/exploits/5GP0E2KFQQ.html
- http://www.securityfocus.com/bid/13529
- http://www.securityfocus.com/bid/13529
- https://exchange.xforce.ibmcloud.com/vulnerabilities/20446
- https://exchange.xforce.ibmcloud.com/vulnerabilities/20446
- https://www.exploit-db.com/exploits/1013
- https://www.exploit-db.com/exploits/1013