Multiple SQL injection vulnerabilities in Bitweaver 2.0.0 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) sort_mode parameter to wiki/list_pages.php and the (2) highlight parameter to search/index.php. NOTE: the researcher also reported injection via JavaScript code in the Search box, but this is probably a forced SQL error or other separate primary issue.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:39
Type | Values Removed | Values Added |
---|---|---|
References | () http://securityreason.com/securityalert/3428 - | |
References | () http://www.hackerscenter.com/archive/view.asp?id=28129 - | |
References | () http://www.securityfocus.com/archive/1/484805/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/26801 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/38943 - |
Information
Published : 2007-12-15 01:46
Updated : 2024-11-21 00:39
NVD link : CVE-2007-6375
Mitre link : CVE-2007-6375
CVE.ORG link : CVE-2007-6375
JSON object : View
Products Affected
bitweaver
- bitweaver
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')