The filter function in php/src/include.php in Simple Management for BIND (aka smbind) before 0.4.8 does not anchor a certain regular expression, which allows remote attackers to conduct SQL injection attacks and execute arbitrary SQL commands via the username parameter to the admin login page.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.org/1009-exploits/smbind-sql.txt - Exploit | |
References | () http://sourceforge.net/projects/smbind/files/smbind/0.4.8/smbind-0.4.8.tar.bz2/download - | |
References | () http://www.debian.org/security/2010/dsa-2103 - | |
References | () http://www.openwall.com/lists/oss-security/2010/09/05/5 - | |
References | () http://www.openwall.com/lists/oss-security/2010/09/07/10 - |
Information
Published : 2010-10-14 05:57
Updated : 2024-11-21 01:17
NVD link : CVE-2010-3076
Mitre link : CVE-2010-3076
CVE.ORG link : CVE-2010-3076
JSON object : View
Products Affected
blentz
- smbind
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')