6.8
CVE-2008-5877
- EPSS 0.49%
- Veröffentlicht 08.01.2009 19:30:11
- Zuletzt bearbeitet 09.04.2025 00:30:58
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
Multiple SQL injection vulnerabilities in Phpclanwebsite (aka PCW) 1.23.3 Fix Pack 5 and earlier, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary SQL commands via the (1) page parameter to index.php, (2) form_id parameter to pcw/processforms.php, (3) pcwlogin and (4) pcw_pass parameters to pcw/setlogin.php, (5) searchvalue parameter to pcw/downloads.php, and the (6) searchvalue and (7) whichfield parameter to pcw/downloads.php, a different vector than CVE-2006-0444.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Phpclanwebsite ≫ Phpclanwebsite Version <= 1.23.3
Phpclanwebsite ≫ Phpclanwebsite Version1.20
Phpclanwebsite ≫ Phpclanwebsite Version1.21
Phpclanwebsite ≫ Phpclanwebsite Version1.22
Phpclanwebsite ≫ Phpclanwebsite Version1.23
Phpclanwebsite ≫ Phpclanwebsite Version1.23.1
Phpclanwebsite ≫ Phpclanwebsite Version1.23.2
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.49% | 0.649 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 6.8 | 8.6 | 6.4 |
AV:N/AC:M/Au:N/C:P/I:P/A:P
|
CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.