SQL injection vulnerability in index.php in Phpclanwebsite (aka PCW) 1.23.1 allows remote attackers to execute arbitrary SQL commands via the (1) par parameter in the post function on the forum page and possibly the (2) poll_id parameter on the poll page. NOTE: the poll_id vector can also allow resultant cross-site scripting (XSS) from an unquoted error message for invalid SQL syntax.
References
Configurations
History
21 Nov 2024, 00:06
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/18597 - Patch, Vendor Advisory | |
References | () http://www.h4cky0u.org/advisories/HYSA-2006-002-phpclan.txt - Exploit, Vendor Advisory | |
References | () http://www.osvdb.org/22720 - | |
References | () http://www.osvdb.org/22722 - | |
References | () http://www.securityfocus.com/archive/1/423145/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/16391 - Patch | |
References | () http://www.vupen.com/english/advisories/2006/0342 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/24355 - |
Information
Published : 2006-01-26 22:03
Updated : 2024-11-21 00:06
NVD link : CVE-2006-0444
Mitre link : CVE-2006-0444
CVE.ORG link : CVE-2006-0444
JSON object : View
Products Affected
phpclanwebsite
- phpclanwebsite
CWE