Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Generic)  >   4images Vendors:
4images Input Validation Flaw in 'search.php' Lets Remote Users Inject SQL Commands
SecurityTracker Alert ID:  1017074
SecurityTracker URL:
CVE Reference:   CVE-2006-5236   (Links to External Site)
Updated:  Jun 2 2008
Original Entry Date:  Oct 17 2006
Impact:   Disclosure of system information, Disclosure of user information, User access via network
Exploit Included:  Yes  
Version(s): 1.7.3 and prior versions
Description:   A vulnerability was reported in 4images. A remote user can inject SQL commands.

The 'images/search.php' script does not properly validate user-supplied input in the 'search_user' parameter. A remote user can supply a specially crafted parameter value to execute SQL commands on the underlying database.

In version 1.7.3, the remote user must be authenticated to exploit this flaw.

The original advisory and exploit is available at:

disfigure discovered this vulnerability and h3llfyr3 of developed the exploit.

Impact:   A remote user can execute SQL commands on the underlying database.
Solution:   No solution was available at the time of this entry.
Vendor URL: (Links to External Site)
Cause:   Input validation error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC