Multiple SQL injection vulnerabilities in Web Group Communication Center (WGCC) 1.0.3 PreRelease 1 and earlier allow remote authenticated users to execute arbitrary SQL commands via the (1) userid parameter to (a) profile.php in a "show moreinfo" action; the (2) bildid parameter to (b) picturegallery.php in a shownext action; the (3) id parameter to (c) filebase.php in a freigeben action, (d) schedule.php in a del action, and (e) profile.php in an observe action; and the (4) pmid parameter in a delete action and (5) folderid parameter in a showfolder action to (f) message.php.
References
Configurations
History
21 Nov 2024, 00:46
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/30235 - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/29188 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/42385 - | |
References | () https://www.exploit-db.com/exploits/5606 - |
Information
Published : 2008-05-27 14:32
Updated : 2024-11-21 00:46
NVD link : CVE-2008-2446
Mitre link : CVE-2008-2446
CVE.ORG link : CVE-2008-2446
JSON object : View
Products Affected
wgcc
- web_group_communication_center
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')