Multiple SQL injection vulnerabilities in Pixelpost 1.5 beta 1 and earlier allow remote attackers to execute arbitrary SQL commands via (1) the showimage parameter in index.php; and the (2) USER_AGENT, (3) HTTP_REFERER, and (4) HTTP_HOST HTTP header fields as used in the book_vistor function in includes/functions.php. NOTE: the vendor has disputed some issues from the original disclosure, but due to the vagueness of the dispute, it is not clear whether the vendor is disputing this particular issue.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:08
Type | Values Removed | Values Added |
---|---|---|
References | () http://forum.pixelpost.org/showthread.php?t=3535 - Exploit | |
References | () http://www.neosecurityteam.net/index.php?action=advisories&id=19 - Exploit, Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/426764/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/16964 - Exploit | |
References | () http://www.vupen.com/english/advisories/2006/0823 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/25044 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/25046 - |
Information
Published : 2006-03-09 13:06
Updated : 2024-11-21 00:08
NVD link : CVE-2006-1104
Mitre link : CVE-2006-1104
CVE.ORG link : CVE-2006-1104
JSON object : View
Products Affected
pixelpost
- pixelpost
CWE