SQL injection vulnerability in the Johannes Hass gaestebuch 2.2 module for PHP-Nuke allows remote attackers to execute arbitrary SQL commands via the id parameter in an edit action to modules.php.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 00:44
Type | Values Removed | Values Added |
---|---|---|
References | () http://cod3rz.helloweb.eu/exploits/gaestebuch.txt - Exploit | |
References | () http://marc.info/?l=bugtraq&m=120440053123054&w=2 - Exploit | |
References | () http://www.securityfocus.com/bid/28063 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/40975 - |
Information
Published : 2008-03-12 17:44
Updated : 2024-11-21 00:44
NVD link : CVE-2008-1314
Mitre link : CVE-2008-1314
CVE.ORG link : CVE-2008-1314
JSON object : View
Products Affected
phpnuke
- php-nuke
johannes_hass
- gaestebuch_module
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')