7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
8.6 High
AI Score
Confidence
Low
0.011 Low
EPSS
Percentile
84.4%
Multiple “potential” SQL injection vulnerabilities in phpWebThings 1.4 Patched might allow remote attackers to execute arbitrary SQL commands via (1) the ref parameter in download.php, (2) the direction, msg, sforum, reason, subname, and toform parameters in forum.php, (3) the msg and forum parameters in forum_edit.php, (4) the msg and forum parameters in forum_write.php, (5) the tekst parameter in guestbook.php, (6) the menuoption parameter in index.php, and the (7) sel_avatar parameter in myaccount.php. NOTE: the forum.php/forum vector is already identified by CVE-2005-3585.
CPE | Name | Operator | Version |
---|---|---|---|
phpwebthings:phpwebthings | phpwebthings | le | 1.4 |
glide.stanford.edu/yichen/research/sec.pdf
secunia.com/advisories/18011/
www.osvdb.org/21650
www.osvdb.org/21651
www.osvdb.org/21652
www.osvdb.org/21653
www.osvdb.org/21654
www.osvdb.org/21655
www.osvdb.org/21656
www.securityfocus.com/archive/1/419280/100/0/threaded
www.securityfocus.com/archive/1/419487/100/0/threaded
www.vupen.com/english/advisories/2005/2860
exchange.xforce.ibmcloud.com/vulnerabilities/23565