CVE-2006-5829
AIOCP 1.3.x - 'cp_codice_fiscale.php' SQL Injection
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
13Exploited in Wild
-Decision
Descriptions
Multiple SQL injection vulnerabilities in All In One Control Panel (AIOCP) 1.3.007 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) choosed_language parameter to (a) cp_dpage.php, (b) cp_news.php, (c) cp_forum_view.php, (d) cp_edit_user.php, (e) cp_newsletter.php, (f) cp_links.php, (g) cp_contact_us.php, (h) cp_login.php, and (i) cp_codice_fiscale.php in public/code/; (2) news_category parameter to public/code/cp_news.php; (3) nlmsg_nlcatid parameter to public/code/cp_newsletter.php; (4) links_category parameter to public/code/cp_links.php; (5) product_category_id parameter to public/code/cp_show_ec_products.php; (6) order_field parameter to public/code/cp_show_ec_products.php; (7) firstrow parameter to public/code/cp_users_online.php; and (8) orderdir parameter to public/code/cp_links_search.php.
Múltiples vulnerabilidades de inyección SQL en All In One Control Panel (AIOCP) 1.3.007 y anteriores permite a atacantes remotos ejecutar comandos SQL de su elección a través del parámetro (1) choosed_language en (a) cp_dpage.php, (b) cp_news.php, (c) cp_forum_view.php, (d) cp_edit_user.php, (e) cp_newsletter.php, (f) cp_links.php, (g) cp_contact_us.php, (h) cp_login.php, y (i) cp_codice_fiscale.php en public/code/; el parámetro (2) news_category parameter de public/code/cp_news.php; el parámetro (3) nlmsg_nlcatid de public/code/cp_newsletter.php; el parámetro (4) links_category de public/code/cp_links.php; el parámetro (5) product_category_id de public/code/cp_show_ec_products.php; el parámetro (6) order_field de public/code/cp_show_ec_products.php; el parámetro (7) firstrow de public/code/cp_users_online.php; y el parámetro (8) orderdir de public/code/cp_links_search.php.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2006-11-06 First Exploit
- 2006-11-09 CVE Reserved
- 2006-11-10 CVE Published
- 2024-08-07 CVE Updated
- 2024-12-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CAPEC
References (19)
URL | Tag | Source |
---|---|---|
http://securityreason.com/securityalert/1839 | Third Party Advisory | |
http://sourceforge.net/project/shownotes.php?release_id=478370 | X_refsource_misc | |
http://www.securityfocus.com/archive/1/450701/100/0/threaded | Mailing List | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/30051 | Vdb Entry |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/28933 | 2006-11-06 | |
https://www.exploit-db.com/exploits/28929 | 2006-11-06 | |
https://www.exploit-db.com/exploits/28923 | 2006-11-06 | |
https://www.exploit-db.com/exploits/28926 | 2006-11-06 | |
https://www.exploit-db.com/exploits/28925 | 2006-11-06 | |
https://www.exploit-db.com/exploits/28928 | 2006-11-06 | |
https://www.exploit-db.com/exploits/28934 | 2006-11-06 | |
https://www.exploit-db.com/exploits/28931 | 2006-11-06 | |
https://www.exploit-db.com/exploits/28924 | 2006-11-06 | |
https://www.exploit-db.com/exploits/28927 | 2006-11-06 | |
https://www.exploit-db.com/exploits/28930 | 2006-11-06 | |
https://www.exploit-db.com/exploits/28932 | 2006-11-06 | |
http://www.securityfocus.com/bid/20931 | 2024-08-07 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/22719 | 2018-10-17 | |
http://www.vupen.com/english/advisories/2006/4378 | 2018-10-17 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Aiocp Search vendor "Aiocp" | Aiocp Search vendor "Aiocp" for product "Aiocp" | <= 1.3.007 Search vendor "Aiocp" for product "Aiocp" and version " <= 1.3.007" | - |
Affected
| ||||||
Aiocp Search vendor "Aiocp" | Aiocp Search vendor "Aiocp" for product "Aiocp" | 1.3.000 Search vendor "Aiocp" for product "Aiocp" and version "1.3.000" | - |
Affected
| ||||||
Aiocp Search vendor "Aiocp" | Aiocp Search vendor "Aiocp" for product "Aiocp" | 1.3.001 Search vendor "Aiocp" for product "Aiocp" and version "1.3.001" | - |
Affected
| ||||||
Aiocp Search vendor "Aiocp" | Aiocp Search vendor "Aiocp" for product "Aiocp" | 1.3.002 Search vendor "Aiocp" for product "Aiocp" and version "1.3.002" | - |
Affected
| ||||||
Aiocp Search vendor "Aiocp" | Aiocp Search vendor "Aiocp" for product "Aiocp" | 1.3.003 Search vendor "Aiocp" for product "Aiocp" and version "1.3.003" | - |
Affected
| ||||||
Aiocp Search vendor "Aiocp" | Aiocp Search vendor "Aiocp" for product "Aiocp" | 1.3.004 Search vendor "Aiocp" for product "Aiocp" and version "1.3.004" | - |
Affected
| ||||||
Aiocp Search vendor "Aiocp" | Aiocp Search vendor "Aiocp" for product "Aiocp" | 1.3.005 Search vendor "Aiocp" for product "Aiocp" and version "1.3.005" | - |
Affected
| ||||||
Aiocp Search vendor "Aiocp" | Aiocp Search vendor "Aiocp" for product "Aiocp" | 1.3.006 Search vendor "Aiocp" for product "Aiocp" and version "1.3.006" | - |
Affected
|