ID CVE-2006-5228 Type cve Reporter NVD Modified 2018-10-17T17:41:46
Description
Multiple SQL injection vulnerabilities in the Google Gadget login.php (gadget/login.php) in Rob Hensley ackerTodo 4.2 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) up_login, (2) up_pass, or (3) up_num_tasks parameters.
{"exploitdb": [{"lastseen": "2016-02-03T08:52:57", "bulletinFamily": "exploit", "description": "AckerTodo 4.2 Login.PHP Multiple SQL Injection Vulnerabilities. CVE-2006-5228. Webapps exploit for php platform", "modified": "2006-10-06T00:00:00", "published": "2006-10-06T00:00:00", "id": "EDB-ID:28767", "href": "https://www.exploit-db.com/exploits/28767/", "type": "exploitdb", "title": "AckerTodo 4.2 Login.PHP Multiple SQL Injection Vulnerabilities", "sourceData": "source: http://www.securityfocus.com/bid/20372/info\r\n\r\nackerTodo is prone to multiple SQL-injection vulnerabilities because the application fails to properly sanitize user-supplied input before using it in SQL queries. \r\n\r\nA successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.\r\n\r\nThese issues affect ackerTodo version 4.2; other versions may also be vulnerable.\r\n\r\nhttp://www.example.com/gadget/login.php?up_login=admin&up_pass=wrongpass')%20or%20(%20'1'%20=%20'1'%20AND%20login%20=%20'admin&up_num_tasks=100%20UNION%20select%20*%20FROM%20tasks", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/28767/"}], "osvdb": [{"lastseen": "2017-04-28T13:20:26", "bulletinFamily": "software", "description": "## Vulnerability Description\nackerTodo contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the 'gadget/login.php' script not properly sanitizing user-supplied input to the 'up_login', 'up_pass', and 'up_num_tasks' variables. This may allow an attacker to inject or manipulate SQL queries in the backend database.\n## Solution Description\nCurrently, there are no known upgrades, patches, or workarounds available to correct this issue.\n## Short Description\nackerTodo contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the 'gadget/login.php' script not properly sanitizing user-supplied input to the 'up_login', 'up_pass', and 'up_num_tasks' variables. This may allow an attacker to inject or manipulate SQL queries in the backend database.\n## Manual Testing Notes\nhttp://[target]/gadget/login.php?up_login=admin&up_pass=wrongpass')%20or%20(%20'1'%20=%20'1'%20AND%20login%20=%20'admin&up_num_tasks=100%20UNION%20select%20*%20FROM%20tasks\n## References:\nVendor URL: http://ackertodo.sourceforge.net/site2/index.html\nVendor Specific News/Changelog Entry: http://ackertodo.cvs.sourceforge.net/ackertodo/ackertodo/src/gadget/login.php?r1=1.3&r2=1.4\nVendor Specific News/Changelog Entry: http://ackertodo.cvs.sourceforge.net/ackertodo/ackertodo/src/gadget/login.php?view=log\nSecurity Tracker: 1017008\n[Secunia Advisory ID:22254](https://secuniaresearch.flexerasoftware.com/advisories/22254/)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-10/0071.html\nISS X-Force ID: 29375\nFrSIRT Advisory: ADV-2006-3951\n[CVE-2006-5228](https://vulners.com/cve/CVE-2006-5228)\nBugtraq ID: 20372\n", "modified": "2006-10-05T07:49:32", "published": "2006-10-05T07:49:32", "href": "https://vulners.com/osvdb/OSVDB:29552", "id": "OSVDB:29552", "title": "ackerTodo gadget/login.php Multiple Variable SQL Injection", "type": "osvdb", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}]}