ID CVE-2005-4159 Type cve Reporter NVD Modified 2018-10-19T11:40:28
Description
DISPUTED NOTE: this issue has been disputed by the vendor and third parties. SQL injection vulnerability in Memberlist.php in Simple Machines Forum (SMF) 1.1 rc1 and earlier allows remote attackers to execute arbitrary SQL commands via the start parameter. NOTE: the vendor says that since only one character can be modified, there is no SQL injection. Thus this might be an "invalid SQL syntax error." Multiple followups support the vendor.
{"id": "CVE-2005-4159", "bulletinFamily": "NVD", "title": "CVE-2005-4159", "description": "** DISPUTED ** NOTE: this issue has been disputed by the vendor and third parties. SQL injection vulnerability in Memberlist.php in Simple Machines Forum (SMF) 1.1 rc1 and earlier allows remote attackers to execute arbitrary SQL commands via the start parameter. NOTE: the vendor says that since only one character can be modified, there is no SQL injection. Thus this might be an \"invalid SQL syntax error.\" Multiple followups support the vendor.", "published": "2005-12-11T06:03:00", "modified": "2018-10-19T11:40:28", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-4159", "reporter": "NVD", "references": ["https://exchange.xforce.ibmcloud.com/vulnerabilities/23546", "http://www.securityfocus.com/bid/15791", "http://www.securityfocus.com/archive/1/419535/100/0/threaded", "http://www.securityfocus.com/archive/1/419105/100/0/threaded", "http://archives.neohapsis.com/archives/bugtraq/2005-12/0090.html", "http://www.securityfocus.com/archive/1/419068/100/0/threaded", "http://www.securityfocus.com/archive/1/419250/100/0/threaded"], "cvelist": ["CVE-2005-4159"], "type": "cve", "lastseen": "2018-10-20T11:06:12", "history": [{"bulletin": {"assessment": {"href": "", "name": "", "system": ""}, "bulletinFamily": "NVD", "cpe": ["cpe:/a:simple_machines:simple_machines_forum:1.1_rc1"], "cvelist": ["CVE-2005-4159"], "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "description": "** DISPUTED ** NOTE: this issue has been disputed by the vendor and third parties. SQL injection vulnerability in Memberlist.php in Simple Machines Forum (SMF) 1.1 rc1 and earlier allows remote attackers to execute arbitrary SQL commands via the start parameter. NOTE: the vendor says that since only one character can be modified, there is no SQL injection. Thus this might be an \"invalid SQL syntax error.\" Multiple followups support the vendor.", "edition": 1, "enchantments": {}, "hash": "884aabff23ce8bbc3dd2bf173a26a8dd74df41c90aaa1caf0f95f0fef16ca054", "hashmap": [{"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "scanner"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "reporter"}, {"hash": "168c8bcf563d7dbdc7be86a3fa144978", "key": "href"}, {"hash": "bcf7efea0269d38115f3596a3e0499ba", "key": "modified"}, {"hash": "4a241b001462ee76c6ad612a53fd8785", "key": "cpe"}, {"hash": "7ab0a423b977836238be9797e5d388d3", "key": "published"}, {"hash": "6d3f4796275bb54c21a33b82f399cc6d", "key": "assessment"}, {"hash": "e5d275b3ebd62646b78320753699e02e", "key": "cvss"}, {"hash": "b32c085d4e086c8cd35a6c152b11900f", "key": "cvelist"}, {"hash": "c6920bae341561011efd8417fcf76650", "key": "references"}, {"hash": "1716b5fcbb7121af74efdc153d0166c5", "key": "type"}, {"hash": "72776813ff53426124c7b154b6daa049", "key": "description"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "bulletinFamily"}, {"hash": "25404304f8ee1e7242ed67534182b611", "key": "title"}], "history": [], "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-4159", "id": "CVE-2005-4159", "lastseen": "2016-09-03T06:07:11", "modified": "2008-09-05T16:56:12", "objectVersion": "1.2", "published": "2005-12-11T06:03:00", "references": ["http://www.securityfocus.com/bid/15791", "http://www.securityfocus.com/archive/1/archive/1/419535/100/0/threaded", "http://www.securityfocus.com/archive/1/archive/1/419068/100/0/threaded", "http://www.securityfocus.com/archive/1/archive/1/419105/100/0/threaded", "http://archives.neohapsis.com/archives/bugtraq/2005-12/0090.html", "http://www.securityfocus.com/archive/1/archive/1/419250/100/0/threaded", "http://xforce.iss.net/xforce/xfdb/23546"], "reporter": "NVD", "scanner": [], "title": "CVE-2005-4159", "type": "cve", "viewCount": 0}, "differentElements": ["references", "modified"], "edition": 1, "lastseen": "2016-09-03T06:07:11"}, {"bulletin": {"assessment": {"href": "", "name": "", "system": ""}, "bulletinFamily": "NVD", "cpe": ["cpe:/a:simple_machines:simple_machines_forum:1.1_rc1"], "cvelist": ["CVE-2005-4159"], "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "description": "** DISPUTED ** NOTE: this issue has been disputed by the vendor and third parties. SQL injection vulnerability in Memberlist.php in Simple Machines Forum (SMF) 1.1 rc1 and earlier allows remote attackers to execute arbitrary SQL commands via the start parameter. NOTE: the vendor says that since only one character can be modified, there is no SQL injection. Thus this might be an \"invalid SQL syntax error.\" Multiple followups support the vendor.", "edition": 2, "enchantments": {"score": {"modified": "2017-07-20T10:48:57", "value": 7.5, "vector": "NONE"}}, "hash": "92f5bcd8c6c79699708b30056960aa8e332fd95be37680cea827f9e4ac538c00", "hashmap": [{"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "scanner"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "reporter"}, {"hash": "168c8bcf563d7dbdc7be86a3fa144978", "key": "href"}, {"hash": "d9af38114cd16b4aa9f098a15d42248c", "key": "references"}, {"hash": "4a241b001462ee76c6ad612a53fd8785", "key": "cpe"}, {"hash": "7ab0a423b977836238be9797e5d388d3", "key": "published"}, {"hash": "6d3f4796275bb54c21a33b82f399cc6d", "key": "assessment"}, {"hash": "e5d275b3ebd62646b78320753699e02e", "key": "cvss"}, {"hash": "b32c085d4e086c8cd35a6c152b11900f", "key": "cvelist"}, {"hash": "1716b5fcbb7121af74efdc153d0166c5", "key": "type"}, {"hash": "8ee724af77a24c21df5157fe3c4f0b7c", "key": "modified"}, {"hash": "72776813ff53426124c7b154b6daa049", "key": "description"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "bulletinFamily"}, {"hash": "25404304f8ee1e7242ed67534182b611", "key": "title"}], "history": [], "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-4159", "id": "CVE-2005-4159", "lastseen": "2017-07-20T10:48:57", "modified": "2017-07-19T21:29:11", "objectVersion": "1.3", "published": "2005-12-11T06:03:00", "references": ["https://exchange.xforce.ibmcloud.com/vulnerabilities/23546", "http://www.securityfocus.com/bid/15791", "http://www.securityfocus.com/archive/1/archive/1/419535/100/0/threaded", "http://www.securityfocus.com/archive/1/archive/1/419068/100/0/threaded", "http://www.securityfocus.com/archive/1/archive/1/419105/100/0/threaded", "http://archives.neohapsis.com/archives/bugtraq/2005-12/0090.html", "http://www.securityfocus.com/archive/1/archive/1/419250/100/0/threaded"], "reporter": "NVD", "scanner": [], "title": "CVE-2005-4159", "type": "cve", "viewCount": 0}, "differentElements": ["references", "modified"], "edition": 2, "lastseen": "2017-07-20T10:48:57"}], "edition": 3, "hashmap": [{"key": "assessment", "hash": "6d3f4796275bb54c21a33b82f399cc6d"}, {"key": "bulletinFamily", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "cpe", "hash": "4a241b001462ee76c6ad612a53fd8785"}, {"key": "cvelist", "hash": "b32c085d4e086c8cd35a6c152b11900f"}, {"key": "cvss", "hash": "e5d275b3ebd62646b78320753699e02e"}, {"key": "description", "hash": "72776813ff53426124c7b154b6daa049"}, {"key": "href", "hash": "168c8bcf563d7dbdc7be86a3fa144978"}, {"key": "modified", "hash": "5a7bfe540d0247023a33b470216c799d"}, {"key": "published", "hash": "7ab0a423b977836238be9797e5d388d3"}, {"key": "references", "hash": "c0600bd6378996df09e950e485d57415"}, {"key": "reporter", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "scanner", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "title", "hash": "25404304f8ee1e7242ed67534182b611"}, {"key": "type", "hash": "1716b5fcbb7121af74efdc153d0166c5"}], "hash": "81bc3f1af3ea14fa76a50fed92968ff30e08e072a7a308fa4f7d0f4732dd33cb", "viewCount": 0, "enchantments": {"score": {"value": 7.5, "vector": "NONE", "modified": "2018-10-20T11:06:12"}, "dependencies": {"references": [{"type": "osvdb", "idList": ["OSVDB:21722"]}], "modified": "2018-10-20T11:06:12"}, "vulnersScore": 7.5}, "objectVersion": "1.3", "cpe": ["cpe:/a:simple_machines:simple_machines_forum:1.1_rc1"], "assessment": {"href": "", "name": "", "system": ""}, "scanner": []}
{"osvdb": [{"lastseen": "2017-04-28T13:20:18", "bulletinFamily": "software", "description": "## Technical Description\nThis issue was originally reported as an SQL injection vulnerability. Subsequent testing by several researchers revealed that the original error message revealed the installation path. Input provided to SMF is sanitized and only allows for a single character insertion, not enough to manipulate SQL queries.\n## Manual Testing Notes\nhttp://[target]/smf/index.php?action=mlist;sa=all;start='\n## References:\nVendor URL: http://www.simplemachines.org/\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2005-12/0102.html\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2005-12/0113.html\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2005-12/0131.html\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2005-12/0090.html\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2005-12/0125.html\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2005-12/0168.html\n[CVE-2005-4159](https://vulners.com/cve/CVE-2005-4159)\nBugtraq ID: 15791\n", "modified": "2005-12-09T17:12:04", "published": "2005-12-09T17:12:04", "href": "https://vulners.com/osvdb/OSVDB:21722", "id": "OSVDB:21722", "title": "Simple Machines Forum (SMF) Memberlist.php start Variable Path Disclosure", "type": "osvdb", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}]}