source: http://www.securityfocus.com/bid/20996/info
Bitweaver is prone to multiple SQL-injection and cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied data.
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.
Bitweaver 1.3.1 and prior versions are vulnerable; other versions may also be affected.
Since this issue is a duplicate of the the issue described in BID 20988 (Bitweaver Multiple Input Validation Vulnerabilities), this BID is being retired.
http://www.example.com/bitweaver/fisheye/index.php?sort_mode=-98
{"id": "EDB-ID:28963", "type": "exploitdb", "bulletinFamily": "exploit", "title": "Bitweaver 1.x fisheye/index.php sort_mode Parameter SQL Injection", "description": "Bitweaver 1.x fisheye/index.php sort_mode Parameter SQL Injection. CVE-2006-6924 . Webapps exploit for php platform", "published": "2006-11-10T00:00:00", "modified": "2006-11-10T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "href": "https://www.exploit-db.com/exploits/28963/", "reporter": "laurent gaffie", "references": [], "cvelist": ["CVE-2006-6924"], "lastseen": "2016-02-03T09:19:09", "viewCount": 2, "enchantments": {"score": {"value": 6.6, "vector": "NONE", "modified": "2016-02-03T09:19:09", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2006-6924"]}, {"type": "osvdb", "idList": ["OSVDB:30346", "OSVDB:30345", "OSVDB:30348", "OSVDB:30347"]}, {"type": "exploitdb", "idList": ["EDB-ID:28964", "EDB-ID:28953", "EDB-ID:28965"]}], "modified": "2016-02-03T09:19:09", "rev": 2}, "vulnersScore": 6.6}, "sourceHref": "https://www.exploit-db.com/download/28963/", "sourceData": "source: http://www.securityfocus.com/bid/20996/info\r\n \r\nBitweaver is prone to multiple SQL-injection and cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied data.\r\n \r\nExploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.\r\n \r\nBitweaver 1.3.1 and prior versions are vulnerable; other versions may also be affected. \r\n \r\nSince this issue is a duplicate of the the issue described in BID 20988 (Bitweaver Multiple Input Validation Vulnerabilities), this BID is being retired.\r\n \r\nhttp://www.example.com/bitweaver/fisheye/index.php?sort_mode=-98", "osvdbidlist": ["30346"]}
{"cve": [{"lastseen": "2020-10-03T11:48:20", "description": "bitweaver 1.3.1 and earlier allows remote attackers to obtain sensitive information via a sort_mode=-98 query string to (1) blogs/list_blogs.php, (2) fisheye/index.php, (3) wiki/orphan_pages.php, or (4) wiki/list_pages.php, which forces a SQL error. NOTE: the fisheye/list_galleries.php vector is already covered by CVE-2005-4380.", "edition": 3, "cvss3": {}, "published": "2007-01-13T02:28:00", "title": "CVE-2006-6924", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2006-6924"], "modified": "2017-07-29T01:29:00", "cpe": ["cpe:/a:bitweaver:bitweaver:1.1.1_beta", "cpe:/a:bitweaver:bitweaver:1.2.1", "cpe:/a:bitweaver:bitweaver:1.1", "cpe:/a:bitweaver:bitweaver:1.3", "cpe:/a:bitweaver:bitweaver:1.3.1"], "id": "CVE-2006-6924", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-6924", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:a:bitweaver:bitweaver:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:bitweaver:bitweaver:1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:bitweaver:bitweaver:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:bitweaver:bitweaver:1.1.1_beta:*:*:*:*:*:*:*", "cpe:2.3:a:bitweaver:bitweaver:1.1:*:*:*:*:*:*:*"]}], "osvdb": [{"lastseen": "2017-04-28T13:20:26", "bulletinFamily": "software", "cvelist": ["CVE-2006-6924"], "description": "## Manual Testing Notes\nhttp://[target]/bitweaver/wiki/orphan_pages.php?sort_mode=-98\n## References:\nVendor URL: http://www.bitweaver.org/\n[Secunia Advisory ID:22793](https://secuniaresearch.flexerasoftware.com/advisories/22793/)\n[Related OSVDB ID: 30348](https://vulners.com/osvdb/OSVDB:30348)\n[Related OSVDB ID: 30345](https://vulners.com/osvdb/OSVDB:30345)\n[Related OSVDB ID: 30346](https://vulners.com/osvdb/OSVDB:30346)\nOther Advisory URL: http://securityreason.com/securityalert/2144\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-11/0142.html\nISS X-Force ID: 30165\nFrSIRT Advisory: ADV-2006-4485\n[CVE-2006-6924](https://vulners.com/cve/CVE-2006-6924)\nBugtraq ID: 20996\n", "edition": 1, "modified": "2006-11-09T11:19:00", "published": "2006-11-09T11:19:00", "href": "https://vulners.com/osvdb/OSVDB:30347", "id": "OSVDB:30347", "title": "bitweaver wiki/orphan_pages.php sort_mode Variable SQL Injection", "type": "osvdb", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}}, {"lastseen": "2017-04-28T13:20:26", "bulletinFamily": "software", "cvelist": ["CVE-2006-6924"], "description": "## Manual Testing Notes\nhttp://[target]/bitweaver/wiki/list_pages.php?find=&sort_mode=-98\n## References:\nVendor URL: http://www.bitweaver.org/\n[Secunia Advisory ID:22793](https://secuniaresearch.flexerasoftware.com/advisories/22793/)\n[Related OSVDB ID: 30347](https://vulners.com/osvdb/OSVDB:30347)\n[Related OSVDB ID: 30342](https://vulners.com/osvdb/OSVDB:30342)\n[Related OSVDB ID: 30345](https://vulners.com/osvdb/OSVDB:30345)\n[Related OSVDB ID: 30346](https://vulners.com/osvdb/OSVDB:30346)\nOther Advisory URL: http://securityreason.com/securityalert/2144\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-11/0142.html\nISS X-Force ID: 30165\nFrSIRT Advisory: ADV-2006-4485\n[CVE-2006-6924](https://vulners.com/cve/CVE-2006-6924)\nBugtraq ID: 20996\n", "edition": 1, "modified": "2006-11-09T11:19:00", "published": "2006-11-09T11:19:00", "href": "https://vulners.com/osvdb/OSVDB:30348", "id": "OSVDB:30348", "title": "bitweaver wiki/list_pages.php sort_mode Variable SQL Injection", "type": "osvdb", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}}, {"lastseen": "2017-04-28T13:20:26", "bulletinFamily": "software", "cvelist": ["CVE-2006-6924"], "description": "## Manual Testing Notes\nhttp://[target]/bitweaver/blogs/list_blogs.php?sort_mode=-98\n## References:\nVendor URL: http://www.bitweaver.org/\n[Secunia Advisory ID:22793](https://secuniaresearch.flexerasoftware.com/advisories/22793/)\n[Related OSVDB ID: 30347](https://vulners.com/osvdb/OSVDB:30347)\n[Related OSVDB ID: 30348](https://vulners.com/osvdb/OSVDB:30348)\n[Related OSVDB ID: 30342](https://vulners.com/osvdb/OSVDB:30342)\n[Related OSVDB ID: 30346](https://vulners.com/osvdb/OSVDB:30346)\nOther Advisory URL: http://securityreason.com/securityalert/2144\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-11/0142.html\nISS X-Force ID: 30165\nFrSIRT Advisory: ADV-2006-4485\n[CVE-2006-6924](https://vulners.com/cve/CVE-2006-6924)\nBugtraq ID: 20996\n", "edition": 1, "modified": "2006-11-09T11:19:00", "published": "2006-11-09T11:19:00", "href": "https://vulners.com/osvdb/OSVDB:30345", "id": "OSVDB:30345", "title": "bitweaver blogs/list_blogs.php sort_mode Variable SQL Injection", "type": "osvdb", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}}, {"lastseen": "2017-04-28T13:20:26", "bulletinFamily": "software", "cvelist": ["CVE-2006-6924"], "description": "## Manual Testing Notes\nhttp://[target]/bitweaver/fisheye/index.php?sort_mode=-98\n## References:\nVendor URL: http://www.bitweaver.org/\n[Secunia Advisory ID:22793](https://secuniaresearch.flexerasoftware.com/advisories/22793/)\n[Related OSVDB ID: 30347](https://vulners.com/osvdb/OSVDB:30347)\n[Related OSVDB ID: 30348](https://vulners.com/osvdb/OSVDB:30348)\n[Related OSVDB ID: 30342](https://vulners.com/osvdb/OSVDB:30342)\n[Related OSVDB ID: 30345](https://vulners.com/osvdb/OSVDB:30345)\nOther Advisory URL: http://securityreason.com/securityalert/2144\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-11/0142.html\nISS X-Force ID: 30165\nFrSIRT Advisory: ADV-2006-4485\n[CVE-2006-6924](https://vulners.com/cve/CVE-2006-6924)\nBugtraq ID: 20996\n", "edition": 1, "modified": "2006-11-09T11:19:00", "published": "2006-11-09T11:19:00", "href": "https://vulners.com/osvdb/OSVDB:30346", "id": "OSVDB:30346", "title": "bitweaver fisheye/index.php sort_mode Variable SQL Injection", "type": "osvdb", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}}], "exploitdb": [{"lastseen": "2016-02-03T09:18:09", "description": "Bitweaver 1.x blogs/list_blogs.php sort_mode Parameter SQL Injection. CVE-2006-6924 . Webapps exploit for php platform", "published": "2006-11-10T00:00:00", "type": "exploitdb", "title": "Bitweaver 1.x blogs/list_blogs.php sort_mode Parameter SQL Injection", "bulletinFamily": "exploit", "cvelist": ["CVE-2006-6924"], "modified": "2006-11-10T00:00:00", "id": "EDB-ID:28953", "href": "https://www.exploit-db.com/exploits/28953/", "sourceData": "source: http://www.securityfocus.com/bid/20996/info\r\n\r\nBitweaver is prone to multiple SQL-injection and cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied data.\r\n\r\nExploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.\r\n\r\nBitweaver 1.3.1 and prior versions are vulnerable; other versions may also be affected. \r\n\r\nSince this issue is a duplicate of the the issue described in BID 20988 (Bitweaver Multiple Input Validation Vulnerabilities), this BID is being retired.\r\n\r\nhttp://www.example.com/bitweaver/blogs/list_blogs.php?sort_mode=-98", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "sourceHref": "https://www.exploit-db.com/download/28953/"}, {"lastseen": "2016-02-03T09:19:17", "description": "Bitweaver 1.x wiki/orphan_pages.php sort_mode Parameter SQL Injection. CVE-2006-6924. Webapps exploit for php platform", "published": "2006-11-10T00:00:00", "type": "exploitdb", "title": "Bitweaver 1.x wiki/orphan_pages.php sort_mode Parameter SQL Injection", "bulletinFamily": "exploit", "cvelist": ["CVE-2006-6924"], "modified": "2006-11-10T00:00:00", "id": "EDB-ID:28964", "href": "https://www.exploit-db.com/exploits/28964/", "sourceData": "source: http://www.securityfocus.com/bid/20996/info\r\n \r\nBitweaver is prone to multiple SQL-injection and cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied data.\r\n \r\nExploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.\r\n \r\nBitweaver 1.3.1 and prior versions are vulnerable; other versions may also be affected. \r\n \r\nSince this issue is a duplicate of the the issue described in BID 20988 (Bitweaver Multiple Input Validation Vulnerabilities), this BID is being retired.\r\n \r\nhttp://www.example.com/bitweaver/wiki/orphan_pages.php?sort_mode=-98", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "sourceHref": "https://www.exploit-db.com/download/28964/"}, {"lastseen": "2016-02-03T09:19:25", "description": "Bitweaver 1.x wiki/list_pages.php sort_mode Parameter SQL Injection. CVE-2006-6924. Webapps exploit for php platform", "published": "2006-11-10T00:00:00", "type": "exploitdb", "title": "Bitweaver 1.x wiki/list_pages.php sort_mode Parameter SQL Injection", "bulletinFamily": "exploit", "cvelist": ["CVE-2006-6924"], "modified": "2006-11-10T00:00:00", "id": "EDB-ID:28965", "href": "https://www.exploit-db.com/exploits/28965/", "sourceData": "source: http://www.securityfocus.com/bid/20996/info\r\n \r\nBitweaver is prone to multiple SQL-injection and cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied data.\r\n \r\nExploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.\r\n \r\nBitweaver 1.3.1 and prior versions are vulnerable; other versions may also be affected. \r\n \r\nSince this issue is a duplicate of the the issue described in BID 20988 (Bitweaver Multiple Input Validation Vulnerabilities), this BID is being retired.\r\n \r\nhttp://www.example.com/bitweaver/wiki/list_pages.php?find=&sort_mode=-98", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "sourceHref": "https://www.exploit-db.com/download/28965/"}]}