Vulnerabilities > CVE-2005-4143 - SQL Injection vulnerability in Lyris ListManager
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
SQL injection vulnerability in Lyris ListManager 5.0 through 8.9a allows remote attackers to execute arbitrary SQL commands via SQL code after a numeric argument to a /read/attachment URL.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 5 |
Exploit-Db
description | Lyris ListManager Read Message Attachment SQL Injection Exploit. CVE-2005-4143. Remote exploit for windows platform |
id | EDB-ID:1366 |
last seen | 2016-01-31 |
modified | 2005-12-09 |
published | 2005-12-09 |
reporter | H D Moore |
source | https://www.exploit-db.com/download/1366/ |
title | Lyris ListManager Read Message Attachment SQL Injection Exploit |
Nessus
NASL family | CGI abuses |
NASL id | LISTMANAGER_89B.NASL |
description | The remote host appears to be running ListManager, a web-based commercial mailing list management application from Lyris. The version of ListManager installed on the remote host is affected by a number of input validation flaws. An unauthenticated attacker may be able to exploit these issues to launch SQL injection attacks against the backend database, view the source of any |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 20294 |
published | 2005-12-12 |
reporter | This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/20294 |
title | ListManager < 8.9b Multiple Vulnerabilities |
code |
|
References
- http://archives.neohapsis.com/archives/fulldisclosure/2005-12/0349.html
- http://metasploit.com/research/vulns/lyris_listmanager/
- http://secunia.com/advisories/17943
- http://www.osvdb.org/21548
- http://www.securityfocus.com/archive/1/419077/100/0/threaded
- http://www.securityfocus.com/bid/15787
- http://www.vupen.com/english/advisories/2005/2820