Vulnerabilities > CVE-2006-1828 - Unspecified vulnerability in PHP121 Instant Messenger
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN php121
exploit available
Summary
SQL injection vulnerability in php121language.php in PHP121 1.4 allows remote attackers to execute arbitrary SQL commands and execute arbitrary code via the sess_username variable, as set by the php121un HTTP COOKIE parameter, which is used in multiple files including php121login.php. NOTE: the code execution occurs because the SQL query results are used in an include statement.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | PHP121 Instant Messenger <= 1.4 Remote Code Execution Exploit. CVE-2006-1828. Webapps exploit for php platform |
file | exploits/php/webapps/1666.php |
id | EDB-ID:1666 |
last seen | 2016-01-31 |
modified | 2006-04-12 |
platform | php |
port | |
published | 2006-04-12 |
reporter | rgod |
source | https://www.exploit-db.com/download/1666/ |
title | PHP121 Instant Messenger <= 1.4 - Remote Code Execution Exploit |
type | webapps |
References
- http://retrogod.altervista.org/php121im_14_sql_xpl.html
- http://retrogod.altervista.org/php121im_14_sql_xpl.html
- http://secunia.com/advisories/19643
- http://secunia.com/advisories/19643
- http://securitytracker.com/id?1015936
- http://securitytracker.com/id?1015936
- http://www.securityfocus.com/bid/17509
- http://www.securityfocus.com/bid/17509
- http://www.vupen.com/english/advisories/2006/1349
- http://www.vupen.com/english/advisories/2006/1349
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25785
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25785
- https://www.exploit-db.com/exploits/1666
- https://www.exploit-db.com/exploits/1666