ID CVE-2006-1669
Summary SQL injection vulnerability in chat/messagesL.php3 in phpHeaven Team PHPMyChat 0.14.5 and earlier allows remote attackers to execute arbitrary SQL commands via the T parameter. NOTE: this issue can be leveraged to execute arbitrary shell commands since the username is later processed in an eval() call, but since the username originated from the SQL injection, it could be a resultant issue.
References
Vulnerable Configurations
  • cpe:2.3:a:phpheaven:phpmychat:0.14.4:*:*:*:*:*:*:*
    cpe:2.3:a:phpheaven:phpmychat:0.14.4:*:*:*:*:*:*:*
  • cpe:2.3:a:phpheaven:phpmychat:*:*:*:*:*:*:*:*
    cpe:2.3:a:phpheaven:phpmychat:*:*:*:*:*:*:*:*
CVSS
Base: 6.4 (as of 18-10-2018 - 16:33)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:P/A:P
refmap via4
bid 17382
bugtraq 20060405 PHPMyChat <= 0.14.5 remote commands execution
exploit-db 1646
sectrack 1015873
xf phpmychat-messagesl-sql-injection(25687)
Last major update 18-10-2018 - 16:33
Published 07-04-2006 - 10:04
Last modified 18-10-2018 - 16:33
Back to Top