[Forgot Password]
Login  Register Subscribe

23631

 
 

115083

 
 

97147

 
 

909

 
 

78730

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2009-0646

Date: (C)2009-02-18   (M)2017-10-04
 
CVSS Score: 7.5Access Vector: NETWORK
Exploitability Subscore: 10.0Access Complexity: LOW
Impact Subscore: 6.4Authentication: NONE
 Confidentiality: PARTIAL
 Integrity: PARTIAL
 Availability: PARTIAL











Multiple SQL injection vulnerabilities in 4Site CMS 2.6 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) login and (2) password parameters to pcgi/4site.pl, (3) page parameter to print/print.shtml, (4) s and (5) i parameters to portfolio/index.shtml, (6) h parameter to hotel/index.php, (7) id parameter to news/news1.shtml, and the (8) th parameter to faq/index.shtml.

Reference:
http://www.securityfocus.com/archive/1/archive/1/514376/100/0/threaded
BID-33594
SECUNIA-33733
4sitecms-faq-sql-injection(48488)
4sitecms-hotels-sql-injection(48486)
4sitecms-news-sql-injection(48487)
4sitecms-pages-sql-injection(48483)
OSVDB-51806
OSVDB-51807
OSVDB-51808
OSVDB-51809
EXPLOIT-DB-7964
http://wsec.ru/wsec-09-002-4site-cms-26-multiple-sql-injections/
http://www.htbridge.ch/advisory/sql_injection_in_4site_cms.html

CWE    1
CWE-89

© 2013 SecPod Technologies