Vulnerabilities > CVE-2006-0517 - SQL Injection vulnerability in SPIP
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Multiple SQL injection vulnerabilities in formulaires/inc-formulaire_forum.php3 in SPIP 1.8.2-e and earlier and 1.9 Alpha 2 (5539) and earlier allow remote attackers to execute arbitrary SQL commands via the (1) id_forum, (2) id_article, or (3) id_breve parameters to forum.php3; (4) unspecified vectors related to "session handling"; and (5) when posting "petitions".
Nessus
NASL family | CGI abuses |
NASL id | SPIP_SQL_INJECTION.NASL |
description | The remote host is running SPIP, an open source CMS written in PHP. The remote version of this software is prone to SQL injection and cross-site scripting attacks. An attacker could send specially crafted URL to modify SQL requests, for example, to obtain the admin password hash, or execute malicious script code on the remote system. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 20978 |
published | 2006-02-25 |
reporter | This script is Copyright (C) 2006-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/20978 |
title | SPIP < 1.8.2-g Multiple Vulnerabilities |
code |
|
References
- http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0990.html
- http://secunia.com/advisories/18676
- http://securityreason.com/securityalert/395
- http://securitytracker.com/id?1015556
- http://www.osvdb.org/22844
- http://www.osvdb.org/22845
- http://www.osvdb.org/22848
- http://www.securityfocus.com/archive/1/423655/100/0/threaded
- http://www.securityfocus.com/bid/16458
- http://www.securityfocus.com/bid/24397
- http://www.vupen.com/english/advisories/2006/0398
- http://www.zone-h.org/en/advisories/read/id=8650/
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24397