VRDA Feed by JPCERT/CC
  Vulnerability Response Decision Assistance Feed : Information for vulnerability impact analysis
[ about VRDA Feed | JPCERT/CC



 
Vulnerability Analysis Result (Revision No : 1) [ Download XML
CVE-2010-4612
cms: Multiple SQL injection vulnerabilities in index.php...
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4612

Original

Multiple SQL injection vulnerabilities in index.php in Hycus CMS 1.0.3, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary SQL commands via the (1) user_name and (2) usr_email parameters to user/1/hregister.html, (3) usr_email parameter to user/1/hlogin.html, (4) useremail parameter to user/1/forgotpass.html, and the (5) q parameter to search/1.html. NOTE: some of these details are obtained from third party information.

Translation   (Show)





About This Analysis Information
Analysis Information Provider:
NIST NVD
First Published:
2010-12-29
Source Information Category:
Advisory, Alert
Last Updated:
2010-12-30




Affected Product Tags
cpe:/a:hycus:cms:1.0.3
 


Vulnerability Analysis Results
[Access Vector]  [?]
Undefined [?]

Local [?]
Adjacent Network [?]
X Network [?]

[Access Complexit]  [?]
Undefined [?]

High [?]
X Medium [?]
Low [?]

[Authentication]  [?]
Undefined [?]

Multiple [?]
Single [?]
X None [?]

[Confidentiality Impact]  [?]
Undefined [?]

None [?]
X Partial [?]
Complete [?]

[Integrity Impact]  [?]
Undefined [?]

None [?]
X Partial [?]
Complete [?]

[Availability Impact]  [?]
Undefined [?]

None [?]
X Partial [?]
Complete [?]

Alternatives




References
BID 45527




BUGTRAQ 20101221 SQL injection in Hycus CMS




EXPLOIT-DB 15797




MISC http://www.htbridge.ch/advisory/sql_injection_in_hycus_cms_3.html




MISC http://www.htbridge.ch/advisory/sql_injection_in_hycus_cms_2.html




MISC http://www.htbridge.ch/advisory/sql_injection_in_hycus_cms_1.html




MISC http://www.htbridge.ch/advisory/sql_injection_in_hycus_cms.html




SECUNIA 42567




Vulnerability Type SQL Injection (CWE-89)





Copyright © 2010 JPCERT/CC All Rights Reserved.