Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL network
low complexity
hivemail
exploit available
Published: 2006-02-18
Updated: 2017-07-20
Summary
Multiple SQL injection vulnerabilities in HiveMail 1.3 and earlier allow remote attackers to execute arbitrary SQL commands via (1) the contactgroupid parameter in addressbook.update.php, (2) the messageid parameter in addressbook.add.php, (3) the folderid parameter in folders.update.php, and possibly certain parameters in (4) calendar.event.php, (5) index.php, (6) pop.download.php, (7) read.bounce.php, (8) rules.block.php, (9) language.php, and (10) certain other scripts; and allow remote authenticated users to execute arbitrary SQL commands via (11) the folderid parameter in index.php and (12) possibly other parameters in certain other scripts, because $_SERVER['PHP_SELF'] is improperly handled.
Vulnerable Configurations
Part | Description | Count |
Application | Hivemail | 10 |
Exploit-Db
description | HiveMail <= 1.3 (addressbook.add.php) Remote Code Execution Exploit. CVE-2006-0757,CVE-2006-0759. Webapps exploit for php platform |
id | EDB-ID:1756 |
last seen | 2016-01-31 |
modified | 2006-05-06 |
published | 2006-05-06 |
reporter | [Oo] |
source | https://www.exploit-db.com/download/1756/ |
title | HiveMail <= 1.3 addressbook.add.php Remote Code Execution Exploit |