Multiple SQL injection vulnerabilities in admin/login_submit.php in Whole Hog Ware Support 1.x allow remote attackers to execute arbitrary SQL commands via (1) the uid parameter (aka Username field) or (2) the pwd parameter (aka Password field). NOTE: some of these details are obtained from third party information.
References
Link | Resource |
---|---|
http://osvdb.org/51733 | |
http://secunia.com/advisories/33777 | Vendor Advisory |
http://www.securityfocus.com/bid/33564 | Exploit |
https://www.exploit-db.com/exploits/7940 | |
http://osvdb.org/51733 | |
http://secunia.com/advisories/33777 | Vendor Advisory |
http://www.securityfocus.com/bid/33564 | Exploit |
https://www.exploit-db.com/exploits/7940 |
Configurations
History
21 Nov 2024, 00:59
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/51733 - | |
References | () http://secunia.com/advisories/33777 - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/33564 - Exploit | |
References | () https://www.exploit-db.com/exploits/7940 - |
Information
Published : 2009-02-10 07:00
Updated : 2024-11-21 00:59
NVD link : CVE-2009-0458
Mitre link : CVE-2009-0458
CVE.ORG link : CVE-2009-0458
JSON object : View
Products Affected
wholehogsoftware
- ware_support
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')