CVE-2008-3762

SQL injection vulnerability in onlinestatus_html.php in Turnkey PHP Live Helper 2.0.1 and earlier allows remote attackers to execute arbitrary SQL commands via the dep parameter, related to lack of input sanitization in the get function in global.php.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:turnkeywebtools:php_live_helper:*:*:*:*:*:*:*:*
cpe:2.3:a:turnkeywebtools:php_live_helper:2.0:*:*:*:*:*:*:*
cpe:2.3:a:turnkeywebtools:php_live_helper:2.0:beta_1:*:*:*:*:*:*
cpe:2.3:a:turnkeywebtools:php_live_helper:2.0:beta_2:*:*:*:*:*:*
cpe:2.3:a:turnkeywebtools:php_live_helper:2.0:beta_3:*:*:*:*:*:*
cpe:2.3:a:turnkeywebtools:php_live_helper:2.0:beta_4:*:*:*:*:*:*
cpe:2.3:a:turnkeywebtools:php_live_helper:2.0:beta_5:*:*:*:*:*:*
cpe:2.3:a:turnkeywebtools:php_live_helper:2.0:beta_6:*:*:*:*:*:*

History

21 Nov 2024, 00:50

Type Values Removed Values Added
References () http://secunia.com/advisories/31521 - Vendor Advisory () http://secunia.com/advisories/31521 - Vendor Advisory
References () http://securityreason.com/securityalert/4178 - () http://securityreason.com/securityalert/4178 -
References () http://www.gulftech.org/?node=research&article_id=00124-08162008 - Exploit () http://www.gulftech.org/?node=research&article_id=00124-08162008 - Exploit
References () http://www.securityfocus.com/archive/1/495542/100/0/threaded - () http://www.securityfocus.com/archive/1/495542/100/0/threaded -
References () http://www.securityfocus.com/bid/30729 - Exploit () http://www.securityfocus.com/bid/30729 - Exploit
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/44568 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/44568 -
References () https://www.exploit-db.com/exploits/6261 - () https://www.exploit-db.com/exploits/6261 -

Information

Published : 2008-08-21 17:41

Updated : 2024-11-21 00:50


NVD link : CVE-2008-3762

Mitre link : CVE-2008-3762

CVE.ORG link : CVE-2008-3762


JSON object : View

Products Affected

turnkeywebtools

  • php_live_helper
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')