The filter function in php/src/include.php in Simple Management for BIND (aka smbind) before 0.4.8 does not anchor a certain regular expression, which allows remote attackers to conduct SQL injection attacks and execute arbitrary SQL commands via the username parameter to the admin login page.
                
            References
                    Configurations
                    Configuration 1 (hide)
                                
                                
  | 
                        
Information
                Published : 2010-10-13 22:57
Updated : 2011-01-18 22:59
NVD link : CVE-2010-3076
Mitre link : CVE-2010-3076
JSON object : View
CWE
                
                    
                        
                        CWE-89
                        
            Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
                blentz
- smbind
 


