Multiple SQL injection vulnerabilities in the (1) update_whosonline_reg and (2) update_whosonline_guest functions in Elite Bulletin Board before 2.1.22 allow remote attackers to execute arbitrary SQL commands via the PATH_INFO to (a) checkuser.php, (b) groups.php, (c) index.php, (d) login.php, (e) quicklogin.php, (f) register.php, (g) Search.php, (h) viewboard.php, or (i) viewtopic.php.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:45
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/bugtraq/2012-12/0114.html - | |
References | () http://elite-board.us/Community/viewtopic.php?bid=1&tid=310 - | |
References | () http://packetstormsecurity.com/files/118962/Elite-Bulletin-Board-2.1.21-SQL-Injection.html - Exploit | |
References | () http://secunia.com/advisories/51622 - Vendor Advisory | |
References | () http://www.exploit-db.com/exploits/23575 - Exploit | |
References | () http://www.osvdb.org/88531 - | |
References | () https://www.htbridge.com/advisory/HTB23133 - Exploit |
Information
Published : 2013-01-12 04:33
Updated : 2025-04-11 00:51
NVD link : CVE-2012-5874
Mitre link : CVE-2012-5874
CVE.ORG link : CVE-2012-5874
JSON object : View
Products Affected
elite-board
- elite_bulletin_board
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')