Vulnerabilities > CVE-2006-4586 - SQL Injection And Authentication Bypass vulnerability in TR Forum TR Forum 2.0
Attack vector
NETWORK Attack complexity
LOW Privileges required
SINGLE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
NONE Summary
The admin panel in Tr Forum 2.0 accepts a username and password hash for authentication, which allows remote authenticated users to perform unauthorized actions, as demonstrated by modifying user settings via the id parameter to /membres/modif_profil.php, and changing a password via /membres/change_mdp.php. NOTE: this can be leveraged with other Tr Forum vulnerabilities to allow unauthenticated attackers to gain privileges.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | Tr Forum 2.0 SQL Injection / Bypass Security Restriction Exploit. CVE-2006-4584,CVE-2006-4586. Webapps exploit for php platform |
file | exploits/php/webapps/2297.pl |
id | EDB-ID:2297 |
last seen | 2016-01-31 |
modified | 2006-09-04 |
platform | php |
port | |
published | 2006-09-04 |
reporter | DarkFig |
source | https://www.exploit-db.com/download/2297/ |
title | Tr Forum 2.0 - SQL Injection / Bypass Security Restriction Exploit |
type | webapps |
References
- http://acid-root.new.fr/poc/10060903.txt
- http://secunia.com/advisories/21754
- http://securityreason.com/securityalert/1508
- http://securitytracker.com/id?1016788
- http://www.osvdb.org/28542
- http://www.securityfocus.com/archive/1/445079/100/0/threaded
- http://www.securityfocus.com/bid/19834
- http://www.vupen.com/english/advisories/2006/3452
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28756
- https://www.exploit-db.com/exploits/2297