6.8
CVSSv2

CVE-2006-1278

Published: 19/03/2006 Updated: 18/10/2018
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 685
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

SQL injection vulnerability in @1 File Store 2006.03.07 allows remote malicious users to execute arbitrary SQL commands via the id parameter to (1) functions.php and (2) user.php in the libs directory, (3) edit.php and (4) delete.php in control/files/, (5) edit.php and (6) delete.php in control/users/, (7) edit.php, (8) access.php, and (9) in control/folders/, (10) access.php and (11) delete.php in control/groups/, (12) confirm.php, and (13) download.php; (14) the email parameter in password.php, and (15) the id parameter in folder.php. NOTE: it was later reported that vectors 12 and 13 also affect @1 File Store PRO 3.2.

Vulnerable Product Search on Vulmon Subscribe to Product

upoint \\@1 file store 2006.03.07

Exploits

________________________________________ | File Store PRO 32 Blind SQL Injection | |________________________________________| Download from: upointinfo/cgi/demo/fs/filestorezip - Need admin rights: /confirmphp: [code] if(isset($_GET["folder"]) && $_GET["folder"]!="") { $folder=$_GET["folder"]; } else { exit("Bad Request") ...