Vulnerabilities > CVE-2006-1778 - SQL Injection vulnerability in Simplog

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
simplog
nessus
exploit available

Summary

Multiple SQL injection vulnerabilities in Jeremy Ashcraft Simplog 0.9.2 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) blogid parameter in (a) index.php and (b) archive.php, the (2) m and (3) y parameters in archive.php, and the (4) sql parameter in (c) server.php.

Vulnerable Configurations

Part Description Count
Application
Simplog
1

Exploit-Db

descriptionSimplog <= 0.9.2 (s) Remote Commands Execution Exploit. CVE-2006-0146,CVE-2006-0147,CVE-2006-1776,CVE-2006-1777,CVE-2006-1778,CVE-2006-1779,CVE-2006-2029....
fileexploits/php/webapps/1663.php
idEDB-ID:1663
last seen2016-01-31
modified2006-04-11
platformphp
port
published2006-04-11
reporterrgod
sourcehttps://www.exploit-db.com/download/1663/
titleSimplog <= 0.9.2 s Remote Commands Execution Exploit
typewebapps

Nessus

NASL familyCGI abuses
NASL idSIMPLOG_S_FILE_INCLUDE.NASL
descriptionThe remote host is running Simplog, an open source blogging tool written in PHP. The version of Simplog installed on the remote host fails to sanitize input to the
last seen2020-06-01
modified2020-06-02
plugin id21224
published2006-04-14
reporterThis script is Copyright (C) 2006-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/21224
titleSimplog <= 0.9.2 Multiple Vulnerabilities