Vulnerabilities > CVE-2007-1974
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
SQL injection vulnerability in the getArticle function in class/wfsarticle.php in WF-Section (aka WF-Sections) 1.0.1, as used in Xoops modules such as (1) Zmagazine 1.0, (2) Happy Linux XFsection 1.07 and earlier, and possibly other modules, allows remote attackers to execute arbitrary SQL commands via the articleid parameter to print.php.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 | |
Application | 2 |
Exploit-Db
description XOOPS Module Zmagazine 1.0 (print.php) Remote SQL Injection Exploit. CVE-2005-0725,CVE-2007-1974. Webapps exploit for php platform file exploits/php/webapps/3646.pl id EDB-ID:3646 last seen 2016-01-31 modified 2007-04-02 platform php port published 2007-04-02 reporter ajann source https://www.exploit-db.com/download/3646/ title XOOPS Module Zmagazine 1.0 print.php Remote SQL Injection Exploit type webapps description XOOPS Module XFsection <= 1.07 (articleid) BLIND SQL Injection Exploit. CVE-2005-0725,CVE-2007-1974. Webapps exploit for php platform file exploits/php/webapps/3645.html id EDB-ID:3645 last seen 2016-01-31 modified 2007-04-02 platform php port published 2007-04-02 reporter ajann source https://www.exploit-db.com/download/3645/ title XOOPS Module XFsection <= 1.07 articleid BLIND SQL Injection Exploit type webapps description XOOPS Module WF-Section <= 1.01 (articleid) SQL Injection Exploit. CVE-2005-0725,CVE-2007-1974. Webapps exploit for php platform file exploits/php/webapps/3644.pl id EDB-ID:3644 last seen 2016-01-31 modified 2007-04-02 platform php port published 2007-04-02 reporter ajann source https://www.exploit-db.com/download/3644/ title XOOPS Module WF-Section <= 1.01 articleid SQL Injection Exploit type webapps
Nessus
NASL family | CGI abuses |
NASL id | XOOPS_WFSECTION_ARTICLEID_SQL_INJECTION.NASL |
description | The remote host is running the WF-Section module, a third-party module for XOOPS. The version of this module installed on the remote host fails to properly sanitize user-supplied input to the |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 24908 |
published | 2007-04-03 |
reporter | This script is Copyright (C) 2007-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/24908 |
title | XOOPS WF-Section Module print.php articleid Parameter SQL Injection |
code |
|
References
- http://addons.zarilia.com/index.php?page_type=static&id=43
- http://addons.zarilia.com/index.php?page_type=static&id=43
- http://osvdb.org/41387
- http://osvdb.org/41387
- http://osvdb.org/52230
- http://osvdb.org/52230
- http://www.attrition.org/pipermail/vim/2007-April/001507.html
- http://www.attrition.org/pipermail/vim/2007-April/001507.html
- http://www.securityfocus.com/archive/1/488317/100/0/threaded
- http://www.securityfocus.com/archive/1/488317/100/0/threaded
- http://www.securityfocus.com/bid/23258
- http://www.securityfocus.com/bid/23258
- http://www.securityfocus.com/bid/23259
- http://www.securityfocus.com/bid/23259
- http://www.securityfocus.com/bid/23261
- http://www.securityfocus.com/bid/23261
- http://www.vupen.com/english/advisories/2007/1207
- http://www.vupen.com/english/advisories/2007/1207
- http://www.vupen.com/english/advisories/2007/1208
- http://www.vupen.com/english/advisories/2007/1208
- http://www.vupen.com/english/advisories/2007/1209
- http://www.vupen.com/english/advisories/2007/1209
- http://www.xoops.org/modules/newbb/viewtopic.php?viewmode=flat&order=ASC&topic_id=58229&forum=4&move=next&topic_time=1176217411
- http://www.xoops.org/modules/newbb/viewtopic.php?viewmode=flat&order=ASC&topic_id=58229&forum=4&move=next&topic_time=1176217411
- http://www.xoops.org/modules/news/article.php?storyid=3717
- http://www.xoops.org/modules/news/article.php?storyid=3717
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33378
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33378
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33379
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33379
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33380
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33380
- https://www.exploit-db.com/exploits/3644
- https://www.exploit-db.com/exploits/3644
- https://www.exploit-db.com/exploits/3645
- https://www.exploit-db.com/exploits/3645
- https://www.exploit-db.com/exploits/3646
- https://www.exploit-db.com/exploits/3646