Vulnerabilities > CVE-2005-4170 - Input Validation vulnerability in Efiction Project Efiction 1.1
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
SQL injection vulnerability in eFiction 1.1 allows remote attackers to execute arbitrary SQL commands via the uid parameter to viewuser.php.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | efiction 1.0/1.1/2.0 viewuser.php uid Parameter SQL Injection. CVE-2005-4170 . Webapps exploit for php platform |
id | EDB-ID:26594 |
last seen | 2016-02-03 |
modified | 2005-11-25 |
published | 2005-11-25 |
reporter | [email protected] |
source | https://www.exploit-db.com/download/26594/ |
title | efiction 1.0/1.1/2.0 viewuser.php uid Parameter SQL Injection |
Nessus
NASL family | CGI abuses |
NASL id | EFICTION_202.NASL |
description | The remote host is running eFiction, an open source application in PHP for writers. The installed version of eFiction is affected by numerous flaws : - Members may be able to upload files containing arbitrary PHP code disguised as image files and then run that code on the remote host subject to the privileges of the web server user id. If an attacker does not yet have access, he can register and have a password mailed to him automatically. - User-supplied input to several parameters and scripts is used without sanitation, which can lead to SQL injection attacks provided PHP |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 20349 |
published | 2005-12-29 |
reporter | This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/20349 |
title | eFiction < 2.0.2 Multiple Remote Vulnerabilities (SQLi, XSS, Disc) |
References
- http://archives.neohapsis.com/archives/bugtraq/2005-11/0301.html
- http://rgod.altervista.org/efiction2_xpl.html
- http://secunia.com/advisories/17777
- http://securitytracker.com/id?1015273
- http://www.efiction.wallflowergirl.com/forums/viewtopic.php?t=1555
- http://www.osvdb.org/21122
- http://www.securityfocus.com/bid/15568
- http://www.vupen.com/english/advisories/2005/2606
- https://exchange.xforce.ibmcloud.com/vulnerabilities/23373