Attack vector
NETWORK Attack complexity
MEDIUM Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Published: 2006-01-26
Updated: 2018-10-19
Summary
SQL injection vulnerability in index.php in Phpclanwebsite (aka PCW) 1.23.1 allows remote attackers to execute arbitrary SQL commands via the (1) par parameter in the post function on the forum page and possibly the (2) poll_id parameter on the poll page. NOTE: the poll_id vector can also allow resultant cross-site scripting (XSS) from an unquoted error message for invalid SQL syntax. A simple fix has been released on the Main PCW site available directly at <a href="http://www.phpclanwebsite.com/index.php?page=downloads&func=browselist&par=1">http://www.phpclanwebsite.com/index.php?page=downloads&func=browselist&par=1</a> Please download and install imediately. Tech note: Filters id number (par) to contain numbers only.
Vulnerable Configurations
Exploit-Db
description | Phpclanwebsite 1.23.1 (par) Remote SQL Injection Exploit. CVE-2006-0444. Webapps exploit for php platform |
id | EDB-ID:1453 |
last seen | 2016-01-31 |
modified | 2006-01-25 |
published | 2006-01-25 |
reporter | matrix_killer |
source | https://www.exploit-db.com/download/1453/ |
title | Phpclanwebsite 1.23.1 par Remote SQL Injection Exploit |