Vulnerability Details : CVE-2006-5086
Potential exploit
Blog Pixel Motion 2.1.1 allows remote attackers to change the username and password for the admin user via a direct request to insere_base.php with modified (1) login and (2) pass parameters. NOTE: this issue was claimed to be SQL injection by the original researcher, but it is not.
Vulnerability category: Sql Injection
Products affected by CVE-2006-5086
- cpe:2.3:a:pixel_motion:pixel_motion_blog:2.1.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-5086
0.64%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 69 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-5086
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.4
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:P/A:N |
10.0
|
4.9
|
NIST |
References for CVE-2006-5086
-
http://secunia.com/advisories/22163
About Secunia Research | FlexeraVendor Advisory
-
http://www.securityfocus.com/archive/1/447167/100/0/threaded
-
http://securityreason.com/securityalert/1653
Blog Pixel Motion V2.1.1 PHP Code Execution / Create Admin Exploit - CXSecurity.com
-
http://acid-root.new.fr/poc/12060927.txt
new.fr is available for purchase - Sedo.comExploit
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/29222
Jump to