Vulnerabilities > CVE-2005-3063 - SQL Injection vulnerability in UNU Networks Mailgust 1.9

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
unu-networks
nessus
exploit available

Summary

SQL injection vulnerability in MailGust 1.9 allows remote attackers to execute arbitrary SQL commands via the email field on the password reminder page.

Vulnerable Configurations

Part Description Count
Application
Unu_Networks
1

Exploit-Db

descriptionMailGust <= 1.9 (board takeover) SQL Injection Exploit. CVE-2005-3063. Webapps exploit for php platform
idEDB-ID:1227
last seen2016-01-31
modified2005-09-24
published2005-09-24
reporterrgod
sourcehttps://www.exploit-db.com/download/1227/
titleMailGust <= 1.9 board takeover SQL Injection Exploit

Nessus

NASL familyCGI abuses
NASL idMAILGUST_SQL_INJECTION.NASL
descriptionThe remote host appears to be running MailGust, a mailing list manager, newsletter distribution tool and message board. A vulnerability was identified in MailGust that could be exploited by remote attackers to execute arbitrary SQL commands provided PHP
last seen2020-06-01
modified2020-06-02
plugin id19947
published2005-10-06
reporterThis script is Copyright (C) 2005-2018 Ferdy Riphagen
sourcehttps://www.tenable.com/plugins/nessus/19947
titleMailgust Password Reminder email Field SQL Injection