SQL injection vulnerability in PostNuke 7.2.6 and earlier allows remote attackers to execute arbitrary SQL via (1) the sif parameter to index.php in the Comments module or (2) timezoneoffset parameter to changeinfo.php in the Your_Account module.
References
Configurations
History
20 Nov 2024, 23:52
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/020154.html - Exploit | |
References | () http://marc.info/?l=bugtraq&m=108256503718978&w=2 - | |
References | () http://news.postnuke.com/Article2580.html - Vendor Advisory | |
References | () http://secunia.com/advisories/11386 - | |
References | () http://securitytracker.com/id?1009801 - | |
References | () http://www.osvdb.org/5368 - | |
References | () http://www.osvdb.org/5369 - | |
References | () http://www.securityfocus.com/bid/10146 - Patch | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/15869 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/15875 - |
Information
Published : 2004-12-31 05:00
Updated : 2025-04-03 01:03
NVD link : CVE-2004-1949
Mitre link : CVE-2004-1949
CVE.ORG link : CVE-2004-1949
JSON object : View
Products Affected
postnuke_software_foundation
- postnuke
CWE