Vulnerabilities > CVE-2007-3052 - Unspecified vulnerability in Postnuke Software Foundation Pnphpbb
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
SQL injection vulnerability in index.php in the PNphpBB2 1.2i and earlier module for PostNuke allows remote attackers to execute arbitrary SQL commands via the c parameter.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | PNphpBB2. CVE-2007-3052. Webapps exploit for php platform |
file | exploits/php/webapps/4026.php |
id | EDB-ID:4026 |
last seen | 2016-01-31 |
modified | 2007-06-03 |
platform | php |
port | |
published | 2007-06-03 |
reporter | Kacper |
source | https://www.exploit-db.com/download/4026/ |
title | PNphpBB2 <= 1.2 - index.php c Remote SQL Injection Exploit |
type | webapps |
Nessus
NASL family | CGI abuses |
NASL id | PNPHPBB_CAT_ID_SQL_INJECTION.NASL |
description | The version of PNphpBB2 on the remote host fails to properly sanitize user-supplied input before using it in a database query in the |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 25421 |
published | 2007-06-05 |
reporter | This script is Copyright (C) 2007-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/25421 |
title | PNphpBB2 index.php c Parameter SQL Injection |
code |
|
References
- http://osvdb.org/35424
- http://osvdb.org/35424
- http://secunia.com/advisories/25480
- http://secunia.com/advisories/25480
- http://www.securityfocus.com/bid/24295
- http://www.securityfocus.com/bid/24295
- http://www.vupen.com/english/advisories/2007/2037
- http://www.vupen.com/english/advisories/2007/2037
- https://exchange.xforce.ibmcloud.com/vulnerabilities/34668
- https://exchange.xforce.ibmcloud.com/vulnerabilities/34668
- https://www.exploit-db.com/exploits/4026
- https://www.exploit-db.com/exploits/4026