Vulnerability Details : CVE-2006-5829
Potential exploit
Multiple SQL injection vulnerabilities in All In One Control Panel (AIOCP) 1.3.007 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) choosed_language parameter to (a) cp_dpage.php, (b) cp_news.php, (c) cp_forum_view.php, (d) cp_edit_user.php, (e) cp_newsletter.php, (f) cp_links.php, (g) cp_contact_us.php, (h) cp_login.php, and (i) cp_codice_fiscale.php in public/code/; (2) news_category parameter to public/code/cp_news.php; (3) nlmsg_nlcatid parameter to public/code/cp_newsletter.php; (4) links_category parameter to public/code/cp_links.php; (5) product_category_id parameter to public/code/cp_show_ec_products.php; (6) order_field parameter to public/code/cp_show_ec_products.php; (7) firstrow parameter to public/code/cp_users_online.php; and (8) orderdir parameter to public/code/cp_links_search.php.
Vulnerability category: Sql Injection
Products affected by CVE-2006-5829
- cpe:2.3:a:aiocp:aiocp:*:*:*:*:*:*:*:*
- cpe:2.3:a:aiocp:aiocp:1.3.003:*:*:*:*:*:*:*
- cpe:2.3:a:aiocp:aiocp:1.3.004:*:*:*:*:*:*:*
- cpe:2.3:a:aiocp:aiocp:1.3.005:*:*:*:*:*:*:*
- cpe:2.3:a:aiocp:aiocp:1.3.006:*:*:*:*:*:*:*
- cpe:2.3:a:aiocp:aiocp:1.3.001:*:*:*:*:*:*:*
- cpe:2.3:a:aiocp:aiocp:1.3.002:*:*:*:*:*:*:*
- cpe:2.3:a:aiocp:aiocp:1.3.000:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-5829
1.36%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 79 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-5829
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2006-5829
-
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2006-5829
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/30051
AIOCP (All In One Control Panel) choosed_language SQL injection CVE-2006-5829 Vulnerability Report
-
http://www.securityfocus.com/archive/1/450701/100/0/threaded
-
http://www.securityfocus.com/bid/20931
Exploit
-
http://secunia.com/advisories/22719
About Secunia Research | FlexeraVendor Advisory
-
http://sourceforge.net/project/shownotes.php?release_id=478370
-
http://securityreason.com/securityalert/1839
-
http://www.vupen.com/english/advisories/2006/4378
Site en constructionVendor Advisory
Jump to