Multiple SQL injection vulnerabilities in GeheimChaos 0.5 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) Temp_entered_login or (2) Temp_entered_email parameters to (a) gc.php, and in multiple parameters in (b) include/registrieren.php, possibly involving the (3) $form_email, (4) $form_vorname, (5) $form_nachname, (6) $form_strasse, (7) $form_plzort, (8) $form_land, (9) $form_homepage, (10) $form_bildpfad, (11) $form_profilsichtbar, (12) $Temp_sprache, (13) $form_tag, (14) $form_monat, (15) $form_jahr, (16) $Temp_akt_string, (17) $form_icq, (18) $form_msn, (19) $form_yahoo, (20) $form_username, and (21) $Temp_form_pass variables.
Publish Date : 2006-08-14 Last Update Date : 2018-10-17
-
CVSS Scores & Vulnerability Types
CVSS Score |
5.1 |
Confidentiality Impact |
Partial
(There is considerable informational disclosure.) |
Integrity Impact |
Partial
(Modification of some system files or information is possible, but the attacker does not have control over what can be modified, or the scope of what the attacker can affect is limited.) |
Availability Impact |
Partial
(There is reduced performance or interruptions in resource availability.) |
Access Complexity |
High
(Specialized access conditions exist. It is hard to exploit and several special conditions must be satisfied to exploit) |
Authentication |
Not required
(Authentication is not required to exploit the vulnerability.) |
Gained Access |
None |
Vulnerability Type(s) |
Execute CodeSql Injection |
CWE ID |
CWE id is not defined for this vulnerability |
|
|
-
Products Affected By CVE-2006-4118
-
Number Of Affected Versions By Product
-
References For CVE-2006-4118
|
|