SQL injection vulnerability in Mambo 4.5.3, 4.5.3h, and possibly earlier versions allows remote attackers to execute arbitrary SQL commands via (1) the $username variable in the mosGetParam function and (2) the $task parameter in the mosMenuCheck function in (a) includes/mambo.php; and (3) the $filter variable to the showCategory function in the com_content component (content.php).
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:09
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/bugtraq/2006-02/0463.html - Exploit, Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/18935 - Vendor Advisory | |
References | () http://source.mambo-foundation.org/view/news/Announcements/Security_Patch_Released/ - Patch | |
References | () http://www.gulftech.org/?node=research&article_id=00104-02242006 - Exploit, Patch | |
References | () http://www.osvdb.org/23402 - | |
References | () http://www.osvdb.org/23503 - | |
References | () http://www.securityfocus.com/bid/16775 - Exploit, Patch | |
References | () http://www.vupen.com/english/advisories/2006/0719 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/24951 - |
Information
Published : 2006-04-17 10:02
Updated : 2024-11-21 00:09
NVD link : CVE-2006-1794
Mitre link : CVE-2006-1794
CVE.ORG link : CVE-2006-1794
JSON object : View
Products Affected
mambo
- mambo
CWE