Vulnerabilities > CVE-2006-2826 - Code Execution vulnerability in PHPLIB
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
SQL injection vulnerability in sessions.inc in PHP Base Library (PHPLib) before 7.4a allows remote attackers to execute arbitrary SQL commands via the id variable, which is set by a client through a query string or a cookie.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 |
Exploit-Db
description | PHPLib < 7.4 - SQL Injection. CVE-2006-0887,CVE-2006-2826. Webapps exploit for PHP platform |
id | EDB-ID:43838 |
last seen | 2018-01-24 |
modified | 2016-03-05 |
published | 2016-03-05 |
reporter | Exploit-DB |
source | https://www.exploit-db.com/download/43838/ |
title | PHPLib < 7.4 - SQL Injection |
References
- http://secunia.com/advisories/16902
- http://securitytracker.com/id?1016123
- http://sourceforge.net/project/shownotes.php?group_id=31885&release_id=396091
- http://www.gulftech.org/?node=research&article_id=00107-03052006
- http://www.osvdb.org/23466
- http://www.securityfocus.com/bid/16801
- http://www.vupen.com/english/advisories/2006/0720
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24873