Vulnerability Details : CVE-2006-0759
Multiple SQL injection vulnerabilities in HiveMail 1.3 and earlier allow remote attackers to execute arbitrary SQL commands via (1) the contactgroupid parameter in addressbook.update.php, (2) the messageid parameter in addressbook.add.php, (3) the folderid parameter in folders.update.php, and possibly certain parameters in (4) calendar.event.php, (5) index.php, (6) pop.download.php, (7) read.bounce.php, (8) rules.block.php, (9) language.php, and (10) certain other scripts; and allow remote authenticated users to execute arbitrary SQL commands via (11) the folderid parameter in index.php and (12) possibly other parameters in certain other scripts, because $_SERVER['PHP_SELF'] is improperly handled.
Vulnerability category: Sql Injection
Products affected by CVE-2006-0759
- cpe:2.3:a:hivemail:hivemail:1.2_sp1:*:*:*:*:*:*:*
- cpe:2.3:a:hivemail:hivemail:1.3:*:*:*:*:*:*:*
- cpe:2.3:a:hivemail:hivemail:1.1:*:*:*:*:*:*:*
- cpe:2.3:a:hivemail:hivemail:1.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:hivemail:hivemail:1.3_beta1:*:*:*:*:*:*:*
- cpe:2.3:a:hivemail:hivemail:1.3_rc1:*:*:*:*:*:*:*
- cpe:2.3:a:hivemail:hivemail:1.2.1_rc:*:*:*:*:*:*:*
- cpe:2.3:a:hivemail:hivemail:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:hivemail:hivemail:1.2:*:*:*:*:*:*:*
- cpe:2.3:a:hivemail:hivemail:1.2.1_beta1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-0759
0.59%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 76 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-0759
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2006-0759
-
http://www.securityfocus.com/bid/16591
-
http://www.gulftech.org/?node=research&article_id=00098-02102006
Vendor Advisory
-
http://www.vupen.com/english/advisories/2006/0527
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/24623
-
http://securityreason.com/securityalert/422
-
http://archives.neohapsis.com/archives/bugtraq/2006-02/0162.html
Vendor Advisory
-
http://forum.hivemail.com/showthread.php?p=26745
Jump to