Multiple SQL injection vulnerabilities in eintragen.php in GaesteChaos 0.2 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) gastname, (2) gastwohnort, or (3) gasteintrag parameters.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/19343 | Third Party Advisory VDB Entry |
http://secunia.com/advisories/21357 | Permissions Required Third Party Advisory |
http://www.vupen.com/english/advisories/2006/3155 | Not Applicable |
http://marc.info/?l=full-disclosure&m=115464286427745&w=2 | Exploit Mailing List |
https://exchange.xforce.ibmcloud.com/vulnerabilities/28218 | |
http://www.securityfocus.com/archive/1/442205/100/200/threaded |
Configurations
Information
Published : 2006-08-09 15:04
Updated : 2018-10-17 14:33
NVD link : CVE-2006-4039
Mitre link : CVE-2006-4039
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
chaossoft
- gaestechaos