7.5
CVSSv2

CVE-2006-1353

Published: 22/03/2006 Updated: 18/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple SQL injection vulnerabilities in ASPPortal 3.1.1 and previous versions allow remote malicious users to execute arbitrary SQL commands via (1) the downloadid parameter in download_click.asp and (2) content_ID parameter in news/News_Item.asp; authenticated administrators can also conduct attacks via (3) user_id parameter to users/add_edit_user.asp, (4) bannerid parameter to banner_adds/banner_add_edit.asp, (5) cat_id parameter to categories/add_edit_cat.asp, (6) Content_ID parameter to News/add_edit_news.asp, (7) download_id parameter to downloads/add_edit_download.asp, (8) Poll_ID parameter to poll/add_edit_poll.asp, (9) contactid parameter to contactus/contactus_add_edit.asp, (10) sortby parameter to poll/poll_list.asp, and (11) unspecified inputs to downloads/add_edit_download.asp.

Vulnerable Product Search on Vulmon Subscribe to Product

aspportal aspportal 3.0.0

aspportal aspportal 3.1.0

aspportal aspportal 3.1.1

Exploits

#!/usr/bin/perl #Method found & Exploit scripted by nukedx #Contacts > ICQ: 10072 MSN/Main: nukedx@nukedxcom web: wwwnukedxcom #Original advisory: wwwnukedxcom/?viewdoc=21 #Usage: aspppl <host> <path> <user> use IO::Socket; use Math::BigInt; if(@ARGV != 3) { usage(); } else { exploit(); } sub header() { print ...