7.5
CVSSv2

CVE-2007-4956

Published: 18/09/2007 Updated: 29/09/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 765
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple SQL injection vulnerabilities in KwsPHP 1.0 allow remote malicious users to execute arbitrary SQL commands via (1) the pseudo parameter to login.php, (2) the id parameter to index.php in a carnet editer action in the Member_Space (espace_membre) module, or (3) the typenav parameter to index.php in a browser aff action in the stats module.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

kwsphp kwsphp 1.0

Exploits

#!/usr/bin/perl use LWP::UserAgent; use HTTP::Cookies; $host = $ARGV[0]; $User = $ARGV[1]; $passwd = $ARGV[2]; $url = ""$host; $port = "80"; print q( ################################################################ # Script: KwsPHP v10 Member_Space Module # # Script Site: kwskoogarorg/ ...
################################################### # Script: KwsPHP ver 10 stats Module # Script Site: kwskoogarorg/ # Vulnerability: Remote SQL injection Exploit # Access: Remote # level: Dangerous # Author ...
################################################### # Script: KwsPHP ver 10 # Script Site: kwskoogarorg/ # Vulnerability: loginphp Remote SQL injection Exploit # Access: Remote # level: Dangerous # Author ...