SQL injection vulnerability in chat/messagesL.php3 in phpHeaven Team PHPMyChat 0.14.5 and earlier allows remote attackers to execute arbitrary SQL commands via the T parameter. NOTE: this issue can be leveraged to execute arbitrary shell commands since the username is later processed in an eval() call, but since the username originated from the SQL injection, it could be a resultant issue.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:09
Type | Values Removed | Values Added |
---|---|---|
References | () http://securitytracker.com/id?1015873 - | |
References | () http://www.securityfocus.com/archive/1/430358/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/17382 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/25687 - | |
References | () https://www.exploit-db.com/exploits/1646 - |
Information
Published : 2006-04-07 10:04
Updated : 2024-11-21 00:09
NVD link : CVE-2006-1669
Mitre link : CVE-2006-1669
CVE.ORG link : CVE-2006-1669
JSON object : View
Products Affected
phpheaven
- phpmychat
CWE