Vulnerabilities > CVE-2005-4226 - SQL-Injection vulnerability in PhpWebThings

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
phpwebthings
exploit available

Summary

Multiple "potential" SQL injection vulnerabilities in phpWebThings 1.4 Patched might allow remote attackers to execute arbitrary SQL commands via (1) the ref parameter in download.php, (2) the direction, msg, sforum, reason, subname, and toform parameters in forum.php, (3) the msg and forum parameters in forum_edit.php, (4) the msg and forum parameters in forum_write.php, (5) the tekst parameter in guestbook.php, (6) the menuoption parameter in index.php, and the (7) sel_avatar parameter in myaccount.php. NOTE: the forum.php/forum vector is already identified by CVE-2005-3585.

Vulnerable Configurations

Part Description Count
Application
Phpwebthings
1

Exploit-Db

descriptionPHPWebThings <= 1.4 (msg/forum) SQL Injection Exploit. CVE-2005-4218,CVE-2005-4226. Webapps exploit for php platform
fileexploits/php/webapps/1324.php
idEDB-ID:1324
last seen2016-01-31
modified2005-11-16
platformphp
port
published2005-11-16
reporterrgod
sourcehttps://www.exploit-db.com/download/1324/
titlePHPWebThings <= 1.4 msg/forum SQL Injection Exploit
typewebapps