8.8 High
AI Score
Confidence
Low
6 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:S/C:P/I:P/A:P
0.002 Low
EPSS
Percentile
61.1%
SQL injection vulnerability in submit.php in PHP-Fusion 6.01.14 and 6.00.307, when magic_quotes_gpc is disabled and the database table prefix is known, allows remote authenticated users to execute arbitrary SQL commands via the submit_info[] parameter in a link submission action. NOTE: it was later reported that 7.00.2 is also affected.
CPE | Name | Operator | Version |
---|---|---|---|
php-fusion:php-fusion | php-fusion | eq | 6.01.14 |
php-fusion:php-fusion | php-fusion | eq | 6.00.307 |
osvdb.org/51052
secunia.com/advisories/29930
secunia.com/advisories/33295
www.php-fusion.co.uk/news.php
www.securityfocus.com/bid/28855
www.vupen.com/english/advisories/2008/1318/references
exchange.xforce.ibmcloud.com/vulnerabilities/41914
exchange.xforce.ibmcloud.com/vulnerabilities/47610
www.exploit-db.com/exploits/5470
www.exploit-db.com/exploits/7576