Vulnerability Details : CVE-2005-3024
Multiple SQL injection vulnerabilities in vBulletin 3.0.7 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) announcement parameter to announcement.php, the (2) thread[forumid] or (3) criteria parameters to thread.php, (4) userid parameter to user.php, the (5) calendarcustomfieldid, (6) calendarid, (7) moderatorid, (8) holidayid, (9) calendarmoderatorid, or (10) calendar[0] parameters to admincalendar.php, (11) the cronid parameter to cronlog.php, (12) user[usergroupid][0] parameter to email.php, (13) help[0] parameter to help.php, the (14) limitnumber or (15) limitstart parameter to user.php, the (16) usertitleid or (17) ids parameters to usertitle.php, (18) rvt[0] parameter to language.php, (19) keep[0] parameter to phrase.php, (20) dostyleid parameter to template.php, (21) thread[forumid] parameter to thread.php, or (22) usertools.php.
Vulnerability category: Sql Injection
Exploit prediction scoring system (EPSS) score for CVE-2005-3024
Probability of exploitation activity in the next 30 days: 0.19%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 56 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2005-3024
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2005-3024
- http://marc.info/?l=bugtraq&m=112732980702939&w=2
-
http://morph3us.org/advisories/20050917-vbulletin-3.0.7.txt
Exploit;Patch;Vendor Advisory
Products affected by CVE-2005-3024
- cpe:2.3:a:jelsoft:vbulletin:2.0_rc3:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.0_rc2:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.2.8:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.2.7:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.2.9:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0_beta_2:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0_beta_3:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0_beta_5:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0_beta_7:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0_gamma:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:1.0.1:*:lite:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:2.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0_beta_4:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0_beta_6:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:jelsoft:vbulletin:3.0.7:*:*:*:*:*:*:*