aWebBB contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the dpost.php script not properly sanitizing user-supplied input to the 'p' variable. This may allow an attacker to inject or manipulate SQL queries in the backend database.
This vulnerability is only present when the magic_quotes_gpc PHP option is 'off'.
Currently, there are no known upgrades, patches, or workarounds available to correct this issue.
aWebBB contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the dpost.php script not properly sanitizing user-supplied input to the 'p' variable. This may allow an attacker to inject or manipulate SQL queries in the backend database.
Vendor URL: http://labs.aweb.com.au/ Secunia Advisory ID:19486 Related OSVDB ID: 24340 Related OSVDB ID: 24343 Related OSVDB ID: 24344 Related OSVDB ID: 24352 Related OSVDB ID: 24345 Related OSVDB ID: 24347 Related OSVDB ID: 24348 Related OSVDB ID: 24341 Related OSVDB ID: 24349 Related OSVDB ID: 24350 Related OSVDB ID: 24351 Related OSVDB ID: 24337 Related OSVDB ID: 24346 Other Advisory URL: http://evuln.com/vulns/117/summary.html Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-04/0314.html Keyword: EV0117 ISS X-Force ID: 25587 FrSIRT Advisory: ADV-2006-1197 CVE-2006-1638 Bugtraq ID: 17352