Vulnerabilities > CVE-2007-0676 - SQL Injection vulnerability in Exophpdesk 1.2/1.2.1
Attack vector
NETWORK Attack complexity
MEDIUM Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
SQL injection vulnerability in faq.php in ExoPHPDesk 1.2.1 and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter. Successful exploitation requires that "magic_quotes_gpc" is disabled.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 |
Exploit-Db
description | ExoPHPDesk <= 1.2.1 (faq.php) Remote SQL Injection Vulnerability. CVE-2007-0676. Webapps exploit for php platform |
file | exploits/php/webapps/3234.txt |
id | EDB-ID:3234 |
last seen | 2016-01-31 |
modified | 2007-01-31 |
platform | php |
port | |
published | 2007-01-31 |
reporter | ajann |
source | https://www.exploit-db.com/download/3234/ |
title | ExoPHPDesk <= 1.2.1 faq.php Remote SQL Injection Vulnerability |
type | webapps |
Nessus
NASL family | CGI abuses |
NASL id | EXOPHPDESK_ID_SQL_INJECTION.NASL |
description | The remote host is running Exo PHPDesk, a helpdesk application written in PHP. The version of Exo PHPDesk on the remote host fails to properly sanitize input to the |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 24267 |
published | 2007-02-01 |
reporter | This script is Copyright (C) 2007-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/24267 |
title | ExoPHPDesk faq.php id Parameter SQL Injection |