Vulnerabilities > CVE-2005-4170 - Input Validation vulnerability in Efiction Project Efiction 1.1

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
efiction-project
nessus
exploit available

Summary

SQL injection vulnerability in eFiction 1.1 allows remote attackers to execute arbitrary SQL commands via the uid parameter to viewuser.php.

Vulnerable Configurations

Part Description Count
Application
Efiction_Project
1

Exploit-Db

descriptionefiction 1.0/1.1/2.0 viewuser.php uid Parameter SQL Injection. CVE-2005-4170 . Webapps exploit for php platform
idEDB-ID:26594
last seen2016-02-03
modified2005-11-25
published2005-11-25
reporter[email protected]
sourcehttps://www.exploit-db.com/download/26594/
titleefiction 1.0/1.1/2.0 viewuser.php uid Parameter SQL Injection

Nessus

NASL familyCGI abuses
NASL idEFICTION_202.NASL
descriptionThe remote host is running eFiction, an open source application in PHP for writers. The installed version of eFiction is affected by numerous flaws : - Members may be able to upload files containing arbitrary PHP code disguised as image files and then run that code on the remote host subject to the privileges of the web server user id. If an attacker does not yet have access, he can register and have a password mailed to him automatically. - User-supplied input to several parameters and scripts is used without sanitation, which can lead to SQL injection attacks provided PHP
last seen2020-06-01
modified2020-06-02
plugin id20349
published2005-12-29
reporterThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/20349
titleeFiction < 2.0.2 Multiple Remote Vulnerabilities (SQLi, XSS, Disc)