Vulnerabilities > CVE-2006-7071 - Unspecified vulnerability in Invision Power Services Invision Power Board
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
SQL injection vulnerability in classes/class_session.php in Invision Power Board (IPB) 2.1 up to 2.1.6 allows remote attackers to execute arbitrary SQL commands via the CLIENT_IP parameter.
Vulnerable Configurations
Exploit-Db
description | Invision Power Board 2.1. CVE-2006-7071. Webapps exploit for php platform |
file | exploits/php/webapps/2010.pl |
id | EDB-ID:2010 |
last seen | 2016-01-31 |
modified | 2006-07-14 |
platform | php |
port | |
published | 2006-07-14 |
reporter | RusH |
source | https://www.exploit-db.com/download/2010/ |
title | Invision Power Board 2.1 <= 2.1.6 - Remote SQL Injection Exploit |
type | webapps |
Nessus
NASL family | CGI abuses |
NASL id | INVISION_POWER_BOARD_217.NASL |
description | According to its banner, the installation of Invision Power Board on the remote host reportedly fails to sanitize input to the |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 22089 |
published | 2006-07-24 |
reporter | This script is Copyright (C) 2006-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/22089 |
title | Invision Power Board classes/class_session.php CLIENT_IP HTTP Header SQL Injection |
code |
|
References
- http://archives.neohapsis.com/archives/bugtraq/2006-07/0249.html
- http://rst.void.ru/download/r57ipb216gui.txt
- http://secunia.com/advisories/21072
- http://securityreason.com/securityalert/2325
- http://www.vupen.com/english/advisories/2006/2810
- https://exchange.xforce.ibmcloud.com/vulnerabilities/27753
- https://www.exploit-db.com/exploits/2010
- http://archives.neohapsis.com/archives/bugtraq/2006-07/0249.html
- https://www.exploit-db.com/exploits/2010
- https://exchange.xforce.ibmcloud.com/vulnerabilities/27753
- http://www.vupen.com/english/advisories/2006/2810
- http://securityreason.com/securityalert/2325
- http://secunia.com/advisories/21072
- http://rst.void.ru/download/r57ipb216gui.txt