CVE-2006-3249 (GCVE-0-2006-3249)
Vulnerability from cvelistv5
Published
2006-06-27 10:00
Modified
2024-08-07 18:23
Severity ?
CWE
  • n/a
Summary
SQL injection vulnerability in search.php in Phorum 5.1.14 and earlier allows remote attackers to execute arbitrary SQL commands via the page parameter. NOTE: the vendor has disputed this report, stating "If a non positive integer or non-integer is used for the page parameter for a search URL, the search query will use a negative number for the LIMIT clause. This causes the query to break, showing no results. It IS NOT however a sql injection error." While the original report is from a researcher with mixed accuracy, as of 20060703, CVE does not have any additional information regarding this issue
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T18:23:20.665Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.phorum.org/phorum5/read.php?14%2C114358"
          },
          {
            "name": "phorum-search-page-sql-injection(27369)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27369"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.phorum.org/cgi-bin/trac.cgi/ticket/382#preview"
          },
          {
            "name": "27165",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/27165"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://pridels0.blogspot.com/2006/06/phorum-sql-injection-vuln.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-06-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SQL injection vulnerability in search.php in Phorum 5.1.14 and earlier allows remote attackers to execute arbitrary SQL commands via the page parameter.  NOTE: the vendor has disputed this report, stating \"If a non positive integer or non-integer is used for the page parameter for a search URL, the search query will use a negative number for the LIMIT clause. This causes the query to break, showing no results.  It IS NOT however a sql injection error.\"  While the original report is from a researcher with mixed accuracy, as of 20060703, CVE does not have any additional information regarding this issue"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-19T15:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.phorum.org/phorum5/read.php?14%2C114358"
        },
        {
          "name": "phorum-search-page-sql-injection(27369)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27369"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.phorum.org/cgi-bin/trac.cgi/ticket/382#preview"
        },
        {
          "name": "27165",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/27165"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://pridels0.blogspot.com/2006/06/phorum-sql-injection-vuln.html"
        }
      ],
      "tags": [
        "disputed"
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-3249",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "** DISPUTED **  SQL injection vulnerability in search.php in Phorum 5.1.14 and earlier allows remote attackers to execute arbitrary SQL commands via the page parameter.  NOTE: the vendor has disputed this report, stating \"If a non positive integer or non-integer is used for the page parameter for a search URL, the search query will use a negative number for the LIMIT clause. This causes the query to break, showing no results.  It IS NOT however a sql injection error.\"  While the original report is from a researcher with mixed accuracy, as of 20060703, CVE does not have any additional information regarding this issue."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.phorum.org/phorum5/read.php?14,114358",
              "refsource": "MISC",
              "url": "http://www.phorum.org/phorum5/read.php?14,114358"
            },
            {
              "name": "phorum-search-page-sql-injection(27369)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27369"
            },
            {
              "name": "http://www.phorum.org/cgi-bin/trac.cgi/ticket/382#preview",
              "refsource": "MISC",
              "url": "http://www.phorum.org/cgi-bin/trac.cgi/ticket/382#preview"
            },
            {
              "name": "27165",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/27165"
            },
            {
              "name": "http://pridels0.blogspot.com/2006/06/phorum-sql-injection-vuln.html",
              "refsource": "MISC",
              "url": "http://pridels0.blogspot.com/2006/06/phorum-sql-injection-vuln.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-3249",
    "datePublished": "2006-06-27T10:00:00",
    "dateReserved": "2006-06-26T00:00:00",
    "dateUpdated": "2024-08-07T18:23:20.665Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2006-3249\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2006-06-27T10:05:00.000\",\"lastModified\":\"2025-04-03T01:03:51.193\",\"vulnStatus\":\"Deferred\",\"cveTags\":[{\"sourceIdentifier\":\"cve@mitre.org\",\"tags\":[\"disputed\"]}],\"descriptions\":[{\"lang\":\"en\",\"value\":\"SQL injection vulnerability in search.php in Phorum 5.1.14 and earlier allows remote attackers to execute arbitrary SQL commands via the page parameter.  NOTE: the vendor has disputed this report, stating \\\"If a non positive integer or non-integer is used for the page parameter for a search URL, the search query will use a negative number for the LIMIT clause. This causes the query to break, showing no results.  It IS NOT however a sql injection error.\\\"  While the original report is from a researcher with mixed accuracy, as of 20060703, CVE does not have any additional information regarding this issue\"},{\"lang\":\"es\",\"value\":\"** DISCUTIDA ** Vulnerabilidad de inyecci\u00f3n SQL en search.php en Phorum v5.1.14 y anteriores permite a atacantes remotos ejecutar comandos SQL de su elecci\u00f3n a trav\u00e9s del par\u00e1metro page. NOTA: el fabricante ha discutido este tema, alegando que \\\"si un entero no positivo o un no entero es usado en el par\u00e1metro page para una URL de b\u00fasqueda, la solicitud de respuesta usar\u00e1 un numero negativo para la clausula LIMIT. Esto causa que la pregunta rompa, no mostrando resultados. Esto sin embargo, no es un error de inyecci\u00f3n SQL.\\\" Mientras el informe original procede de un investigador con desigual exactitud, como 20060703, el CVE no tiene otra informaci\u00f3n adicional relacionada con el tema. \\r\\n\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":true,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:phorum:phorum:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"5.1.14\",\"matchCriteriaId\":\"2520A79B-FC05-47C4-9D15-46BDE0F6BEB9\"}]}]}],\"references\":[{\"url\":\"http://pridels0.blogspot.com/2006/06/phorum-sql-injection-vuln.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.osvdb.org/27165\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.phorum.org/cgi-bin/trac.cgi/ticket/382#preview\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.phorum.org/phorum5/read.php?14%2C114358\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/27369\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://pridels0.blogspot.com/2006/06/phorum-sql-injection-vuln.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.osvdb.org/27165\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.phorum.org/cgi-bin/trac.cgi/ticket/382#preview\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.phorum.org/phorum5/read.php?14%2C114358\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/27369\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…