CVE-2006-3543
Published Jul 13, 2006
Last updated 3 months ago
Overview
- Description
- Multiple SQL injection vulnerabilities in Invision Power Board (IPB) 1.x and 2.x allow remote attackers to execute arbitrary SQL commands via the (1) idcat and (2) code parameters in a ketqua action in index.php; the id parameter in a (3) Attach and (4) ref action in index.php; the CODE parameter in a (5) Profile, (6) Login, and (7) Help action in index.php; and the (8) member_id parameter in coins_list.php. NOTE: the developer has disputed this issue, stating that the "CODE attribute is never present in an SQL query" and the "'ketqua' [action] and file 'coin_list.php' are not standard IPB 2.x features". It is unknown whether these vectors are associated with an independent module or modification of IPB
- Source
- cve@mitre.org
- NVD status
- Modified
- CNA Tags
- disputed
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:invision_power_services:invision_power_board:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "19CF6BD7-04F2-4D69-8402-EC4B637EA083" }, { "criteria": "cpe:2.3:a:invision_power_services:invision_power_board:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2F0C566E-2AC5-47A2-9246-2FBC87828690" }, { "criteria": "cpe:2.3:a:invision_power_services:invision_power_board:1.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8B83740E-6C38-4BEB-84A2-6B0F01799DCE" }, { "criteria": "cpe:2.3:a:invision_power_services:invision_power_board:1.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "29692429-A920-4BAD-9D79-D36EBE74EFB5" }, { "criteria": "cpe:2.3:a:invision_power_services:invision_power_board:1.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0D52AB16-A202-48B6-82C0-AD13EBCC7FCA" }, { "criteria": "cpe:2.3:a:invision_power_services:invision_power_board:1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C498DCB3-3CC7-4334-BF61-F5DA43F4B90F" }, { "criteria": "cpe:2.3:a:invision_power_services:invision_power_board:1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "99A7875E-DAF0-46CD-AE30-246EB3FC6BB7" }, { "criteria": "cpe:2.3:a:invision_power_services:invision_power_board:1.3.1_final:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F2103FBA-1B72-43FC-A1ED-28F8C7DA0EE4" }, { "criteria": "cpe:2.3:a:invision_power_services:invision_power_board:1.3_final:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "94FBF21B-CF52-41BB-BAF1-AF822586D28B" }, { "criteria": "cpe:2.3:a:invision_power_services:invision_power_board:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C9AF155D-BDF6-4B5F-89BF-62CDE6FB48DA" }, { "criteria": "cpe:2.3:a:invision_power_services:invision_power_board:2.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "19B001F3-8A6E-423D-9382-AA696D193F08" }, { "criteria": "cpe:2.3:a:invision_power_services:invision_power_board:2.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2CDDB243-B03B-4DFE-9234-FD886EA80C50" }, { "criteria": "cpe:2.3:a:invision_power_services:invision_power_board:2.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7139AE38-8E5D-4D1D-A126-9CD10CE13E2C" }, { "criteria": "cpe:2.3:a:invision_power_services:invision_power_board:2.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6E24336F-BD4C-4596-8FFE-9D53AB802BB1" }, { "criteria": "cpe:2.3:a:invision_power_services:invision_power_board:2.0_alpha3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "14F5777B-25A8-4D20-AD24-A639E315582F" }, { "criteria": "cpe:2.3:a:invision_power_services:invision_power_board:2.0_pdr3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6FF0C787-BDC5-4154-809A-864DA3D4769D" }, { "criteria": "cpe:2.3:a:invision_power_services:invision_power_board:2.0_pf1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "23A69133-FF5A-457E-823F-64920A0DB9F7" }, { "criteria": "cpe:2.3:a:invision_power_services:invision_power_board:2.0_pf2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "23C37B74-6486-46A2-AC2C-C27786ED697E" }, { "criteria": "cpe:2.3:a:invision_power_services:invision_power_board:2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5C63DDA0-9B4C-4D3E-9633-82C330753ABA" }, { "criteria": "cpe:2.3:a:invision_power_services:invision_power_board:2.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "67ED0140-7137-4F8D-AEA1-53251D4D4273" }, { "criteria": "cpe:2.3:a:invision_power_services:invision_power_board:2.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "75723F84-9989-4195-9827-E3A6DF2ABA6A" }, { "criteria": "cpe:2.3:a:invision_power_services:invision_power_board:2.1.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E8BC2011-5D19-4AF2-BCCD-38A03D0175FC" }, { "criteria": "cpe:2.3:a:invision_power_services:invision_power_board:2.1_alpha2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "232885C1-B578-4E6E-8472-FF47A17DF976" } ], "operator": "OR" } ] } ]