source: http://www.securityfocus.com/bid/14474/info
Portail PHP is prone to an SQL injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in SQL queries.
The consequences of this attack may vary depending on the type of queries that can be influenced, and the implementation of the database.
This issue is reported to affect Portail PHP version 2.4; Conflicting reports indicate this information may be inaccurate.
http://www.example.com/portailphp/index.php?affiche=Forum-read_mess&id='
{"id": "EDB-ID:26072", "hash": "cf83f8c0a36566bd5c91a781cb133592", "type": "exploitdb", "bulletinFamily": "exploit", "title": "PortailPHP 2.4 Index.PHP SQL Injection Vulnerability", "description": "PortailPHP 2.4 Index.PHP SQL Injection Vulnerability. CVE-2005-2486. Webapps exploit for php platform", "published": "2005-08-04T00:00:00", "modified": "2005-08-04T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://www.exploit-db.com/exploits/26072/", "reporter": "abducter_minds@yahoo.com", "references": [], "cvelist": ["CVE-2005-2486"], "lastseen": "2016-02-03T02:47:36", "history": [], "viewCount": 0, "enchantments": {"score": {"value": 7.3, "vector": "NONE", "modified": "2016-02-03T02:47:36"}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2005-2486"]}, {"type": "osvdb", "idList": ["OSVDB:18685"]}], "modified": "2016-02-03T02:47:36"}, "vulnersScore": 7.3}, "objectVersion": "1.4", "sourceHref": "https://www.exploit-db.com/download/26072/", "sourceData": "source: http://www.securityfocus.com/bid/14474/info\r\n\r\nPortail PHP is prone to an SQL injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in SQL queries.\r\n\r\nThe consequences of this attack may vary depending on the type of queries that can be influenced, and the implementation of the database.\r\n\r\nThis issue is reported to affect Portail PHP version 2.4; Conflicting reports indicate this information may be inaccurate. \r\n\r\nhttp://www.example.com/portailphp/index.php?affiche=Forum-read_mess&id=' ", "osvdbidlist": ["18685"], "_object_type": "robots.models.exploitdb.ExploitDbBulletin", "_object_types": ["robots.models.exploitdb.ExploitDbBulletin", "robots.models.base.Bulletin"]}
{"cve": [{"lastseen": "2019-05-29T18:08:14", "bulletinFamily": "NVD", "description": "SQL injection vulnerability in mod_forum/read_message.php in PortailPHP allows remote attackers to execute arbitrary SQL commands via the id parameter to index.php with the affiche parameter set to \"Forum-read_mess\", a different vulnerability than CVE-2005-1701.", "modified": "2008-09-05T20:51:00", "id": "CVE-2005-2486", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-2486", "published": "2005-08-07T04:00:00", "title": "CVE-2005-2486", "type": "cve", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "osvdb": [{"lastseen": "2017-04-28T13:20:15", "bulletinFamily": "software", "description": "## Vulnerability Description\nPortailPHP contains a flaw that may allow a remote attacker to carry out an SQL injection attack. The issue is due to the 'read_message.php' script not properly sanitizing user-supplied input to the 'id' variable. This may allow a remote attacker to inject or manipulate SQL queries in the backend database.\n## Technical Description\nAccording to the advisory, it has been reported that the affected version is 2.4. However, the latest release is version 1.3.\n## Solution Description\nCurrently, there are no known upgrades, patches, or workarounds available to correct this issue.\n## Short Description\nPortailPHP contains a flaw that may allow a remote attacker to carry out an SQL injection attack. The issue is due to the 'read_message.php' script not properly sanitizing user-supplied input to the 'id' variable. This may allow a remote attacker to inject or manipulate SQL queries in the backend database.\n## Manual Testing Notes\nhttp://[target]/portailphp/index.php?affiche=Forum-read_mess&id='\n## References:\nVendor URL: http://www.safari-msi.com/portailphp/index.php\nOther Advisory URL: http://nvd.nist.gov/nvd.cfm?cvename=CAN-2005-2486\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2005-08/0101.html\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2005-08/0058.html\n[CVE-2005-2486](https://vulners.com/cve/CVE-2005-2486)\nBugtraq ID: 14474\n", "modified": "2005-08-04T17:49:31", "published": "2005-08-04T17:49:31", "href": "https://vulners.com/osvdb/OSVDB:18685", "id": "OSVDB:18685", "type": "osvdb", "title": "PortailPhp mod_forum/read_message.php id Variable SQL Injection", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}]}