ID |
CVE-2006-6289
|
Summary |
Woltlab Burning Board (wBB) Lite 1.0.2 does not properly unset variables when the input data includes a numeric parameter with a value matching an alphanumeric parameter's hash value, which allows remote attackers to execute arbitrary SQL commands via the wbb_userid parameter to the top-level URI. NOTE: it could be argued that this vulnerability is due to a bug in the unset PHP command (CVE-2006-3017) and the proper fix should be in PHP; if so, then this should not be treated as a vulnerability in wBB Lite. Successful exploitation requires that "magic_quotes_gpc" is disabled, and that "register_globals" is enabled. |
References |
|
Vulnerable Configurations |
|
CVSS |
Base: | 6.8 (as of 17-10-2018 - 21:47) |
Impact: | |
Exploitability: | |
|
CWE |
NVD-CWE-Other |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
MEDIUM |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
PARTIAL |
PARTIAL |
PARTIAL |
|
cvss-vector
via4
|
AV:N/AC:M/Au:N/C:P/I:P/A:P
|
refmap
via4
|
|
Last major update |
17-10-2018 - 21:47 |
Published |
05-12-2006 - 11:28 |
Last modified |
17-10-2018 - 21:47 |