The filter function in php/src/include.php in Simple Management for BIND (aka smbind) before 0.4.8 does not anchor a certain regular expression, which allows remote attackers to conduct SQL injection attacks and execute arbitrary SQL commands via the username parameter to the admin login page.
References
Configurations
Configuration 1 (hide)
|
Information
Published : 2010-10-13 22:57
Updated : 2011-01-18 22:59
NVD link : CVE-2010-3076
Mitre link : CVE-2010-3076
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
blentz
- smbind