SQL injection vulnerability in functions/functions_filters.asp in Web Wiz Forums before 8.05a (MySQL version) does not properly filter certain characters in SQL commands, which allows remote attackers to execute arbitrary SQL commands via \"' (backslash double-quote quote) sequences, which are collapsed into \'', as demonstrated via the name parameter to forum/pop_up_member_search.asp.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:28
Type | Values Removed | Values Added |
---|---|---|
References | () http://ifsec.blogspot.com/2007/03/web-wiz-forums-805-mysql-version-sql.html - Exploit | |
References | () http://osvdb.org/34344 - | |
References | () http://secunia.com/advisories/24561 - Vendor Advisory | |
References | () http://securityreason.com/securityalert/2456 - Exploit | |
References | () http://www.securityfocus.com/archive/1/463287/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/23051 - Exploit | |
References | () http://www.vupen.com/english/advisories/2007/1061 - Vendor Advisory | |
References | () http://www.webwizguide.info/web_wiz_forums/Version%20History.txt - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/33095 - |
Information
Published : 2007-03-20 22:19
Updated : 2024-11-21 00:28
NVD link : CVE-2007-1548
Mitre link : CVE-2007-1548
CVE.ORG link : CVE-2007-1548
JSON object : View
Products Affected
webwizguide
- web_wiz_forums
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')