Multiple SQL injection vulnerabilities in eintragen.php in GaesteChaos 0.2 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) gastname, (2) gastwohnort, or (3) gasteintrag parameters.
References
| Link | Resource |
|---|---|
| http://www.securityfocus.com/bid/19343 | Third Party Advisory VDB Entry |
| http://secunia.com/advisories/21357 | Permissions Required Third Party Advisory |
| http://www.vupen.com/english/advisories/2006/3155 | Not Applicable |
| http://marc.info/?l=full-disclosure&m=115464286427745&w=2 | Exploit Mailing List |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/28218 | |
| http://www.securityfocus.com/archive/1/442205/100/200/threaded |
Configurations
Information
Published : 2006-08-09 15:04
Updated : 2018-10-17 14:33
NVD link : CVE-2006-4039
Mitre link : CVE-2006-4039
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
chaossoft
- gaestechaos


