SQL injection vulnerability in system/core/users/users.profile.inc.php in Neocrome Seditio 1.10 and earlier allows remote authenticated users to execute arbitrary SQL commands via a double-url-encoded id parameter to users.php that begins with a valid filename, as demonstrated by "default.gif" followed by an encoded NULL and ' (apostrophe) (%2500%2527).
References
Configurations
History
21 Nov 2024, 00:22
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/23054 - Patch, Vendor Advisory | |
References | () http://securityreason.com/securityalert/1931 - | |
References | () http://www.neocrome.net/page.php?id=2233 - | |
References | () http://www.nukedx.com/?getxpl=52 - Exploit | |
References | () http://www.nukedx.com/?viewdoc=52 - Exploit | |
References | () http://www.securityfocus.com/archive/1/452269/100/100/threaded - | |
References | () http://www.vupen.com/english/advisories/2006/4668 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/30466 - |
Information
Published : 2006-11-30 16:28
Updated : 2025-04-09 00:30
NVD link : CVE-2006-6177
Mitre link : CVE-2006-6177
CVE.ORG link : CVE-2006-6177
JSON object : View
Products Affected
neocrome
- seditio
CWE