Multiple SQL injection vulnerabilities in Invision Power Board (IPB) 1.3 Final allow remote malicious users to execute arbitrary SQL commands via the CODE parameter in a (1) Stats, (2) Mail, and (3) Reg action in index.php. NOTE: the developer has disputed this issue, stating that "At no point does the CODE parameter touch the database. The CODE parameter is used in a SWITCH statement to determine which function to run.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
invision power services invision board 1.3.1_final |
||
invision power services invision board 1.3_final |