Vulnerabilities > CVE-2006-1828 - SQL Injection vulnerability in PHP121 PHP121LOGIN.PHP
Attack vector
NETWORK Attack complexity
HIGH Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
SQL injection vulnerability in php121language.php in PHP121 1.4 allows remote attackers to execute arbitrary SQL commands and execute arbitrary code via the sess_username variable, as set by the php121un HTTP COOKIE parameter, which is used in multiple files including php121login.php. NOTE: the code execution occurs because the SQL query results are used in an include statement. Successful exploitation requires that "magic_quotes_gpc" is disabled.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | PHP121 Instant Messenger <= 1.4 Remote Code Execution Exploit. CVE-2006-1828. Webapps exploit for php platform |
file | exploits/php/webapps/1666.php |
id | EDB-ID:1666 |
last seen | 2016-01-31 |
modified | 2006-04-12 |
platform | php |
port | |
published | 2006-04-12 |
reporter | rgod |
source | https://www.exploit-db.com/download/1666/ |
title | PHP121 Instant Messenger <= 1.4 - Remote Code Execution Exploit |
type | webapps |
References
- http://retrogod.altervista.org/php121im_14_sql_xpl.html
- http://secunia.com/advisories/19643
- http://securitytracker.com/id?1015936
- http://www.securityfocus.com/bid/17509
- http://www.vupen.com/english/advisories/2006/1349
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25785
- https://www.exploit-db.com/exploits/1666