// For flags

CVE-2007-2492

PostNuke Module v4bJournal - SQL Injection

Severity Score

7.5
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

SQL injection vulnerability in index.php in the v4bJournal module for PostNuke allows remote authenticated users to execute arbitrary SQL commands via the id parameter in a journal_comment action.

Vulnerabilidad de inyección SQL en index.php en el módulo v4bJournal para PostNuke, permite a usuarios remotos autenticados ejecutar comandos SQL de su elección mediante el parámetro id en una acción journal_comment.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2007-05-03 CVE Reserved
  • 2007-05-04 CVE Published
  • 2024-08-07 CVE Updated
  • 2024-08-07 EPSS Updated
  • 2024-08-07 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Postnuke Software Foundation
Search vendor "Postnuke Software Foundation"
Postnuke V4bjournal Module
Search vendor "Postnuke Software Foundation" for product "Postnuke V4bjournal Module"
0.99
Search vendor "Postnuke Software Foundation" for product "Postnuke V4bjournal Module" and version "0.99"
-
Affected