Multiple SQL injection vulnerabilities in (1) acid_qry_main.php in Analysis Console for Intrusion Databases (ACID) 0.9.6b20 and (2) base_qry_main.php in Basic Analysis and Security Engine (BASE) 1.2, and unspecified other console scripts in these products, allow remote attackers to execute arbitrary SQL commands via the sig[1] parameter and possibly other parameters.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/15199 | Exploit Patch |
http://secunia.com/advisories/17314 | Exploit Vendor Advisory |
http://www.debian.org/security/2005/dsa-893 | Patch |
http://secunia.com/advisories/17552 | Vendor Advisory |
http://secunia.com/advisories/17558 | Vendor Advisory |
http://www.osvdb.org/20836 | |
http://www.osvdb.org/20837 | |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=336788 | Patch |
http://secunia.com/advisories/17523 | Vendor Advisory |
http://www.vupen.com/english/advisories/2005/2188 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2005-10-27 03:02
Updated : 2012-07-02 21:00
NVD link : CVE-2005-3325
Mitre link : CVE-2005-3325
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
secureideas
- basic_analysis_and_security_engine
acid
- analysis_console_for_intrusion_databases