ID OSVDB:27965 Type osvdb Reporter OSVDB Modified 2006-08-15T09:49:54
Description
Solution Description
Upgrade to version 0.91 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.
References:
Vendor URL: http://owl.sourceforge.net/
Vendor Specific News/Changelog Entry: http://sourceforge.net/tracker/index.php?func=detail&aid=1540643&group_id=9444&atid=309444
Secunia Advisory ID:21519Related OSVDB ID: 27964
Other Advisory URL: http://jvn.jp/jp/JVN%2339103264/index.html
Other Advisory URL: http://jvn.jp/jp/JVN%2301137722/index.html
FrSIRT Advisory: ADV-2006-3285
CVE-2006-4212
Bugtraq ID: 19552
{"id": "OSVDB:27965", "bulletinFamily": "software", "title": "Owl Intranet Engine lib/owl.lib.php SQL Injection", "description": "## Solution Description\nUpgrade to version 0.91 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n## References:\nVendor URL: http://owl.sourceforge.net/\nVendor Specific News/Changelog Entry: http://sourceforge.net/tracker/index.php?func=detail&aid=1540643&group_id=9444&atid=309444\n[Secunia Advisory ID:21519](https://secuniaresearch.flexerasoftware.com/advisories/21519/)\n[Related OSVDB ID: 27964](https://vulners.com/osvdb/OSVDB:27964)\nOther Advisory URL: http://jvn.jp/jp/JVN%2339103264/index.html\nOther Advisory URL: http://jvn.jp/jp/JVN%2301137722/index.html\nFrSIRT Advisory: ADV-2006-3285\n[CVE-2006-4212](https://vulners.com/cve/CVE-2006-4212)\nBugtraq ID: 19552\n", "published": "2006-08-15T09:49:54", "modified": "2006-08-15T09:49:54", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://vulners.com/osvdb/OSVDB:27965", "reporter": "OSVDB", "references": [], "cvelist": ["CVE-2006-4212"], "type": "osvdb", "lastseen": "2017-04-28T13:20:24", "history": [], "edition": 1, "hashmap": [{"key": "affectedSoftware", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "bulletinFamily", "hash": "f9fa10ba956cacf91d7878861139efb9"}, {"key": "cvelist", "hash": "e22fc7dec44a3a5634ecf18d9b6ad895"}, {"key": "cvss", "hash": "e5d275b3ebd62646b78320753699e02e"}, {"key": "description", "hash": "6f9008c0a8abeb9554a5e24c1658edec"}, {"key": "href", "hash": "cf670ca89641b25bf1989f53d7001d41"}, {"key": "modified", "hash": "441d3ca5816ecb1083de06bb6b17d7a2"}, {"key": "objectVersion", "hash": "56765472680401499c79732468ba4340"}, {"key": "published", "hash": "441d3ca5816ecb1083de06bb6b17d7a2"}, {"key": "references", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "reporter", "hash": "955b328dc7cd615c13af5464c9183464"}, {"key": "title", "hash": "dc7bedac547c9b4ed58502c152cfb38c"}, {"key": "type", "hash": "1327ac71f7914948578f08c54f772b10"}], "hash": "7677f91f0fa0f588d5588771032d8abb7904d4fe61f9094bc97ad456281a03ca", "viewCount": 0, "objectVersion": "1.2", "affectedSoftware": [], "enchantments": {"vulnersScore": 7.5}}
{"result": {"cve": [{"id": "CVE-2006-4212", "type": "cve", "title": "CVE-2006-4212", "description": "SQL injection vulnerability in b0zz and Chris Vincent Owl Intranet Engine 0.90 and earlier allows remote attackers to execute arbitrary SQL commands via unspecified vectors.", "published": "2006-08-17T17:04:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-4212", "cvelist": ["CVE-2006-4212"], "lastseen": "2017-07-20T10:49:29"}], "nessus": [{"id": "OWL_091.NASL", "type": "nessus", "title": "Owl Intranet Engine <= 0.91 Multiple Vulnerabilities", "description": "The remote host is running Owl Intranet Engine, a web-based document management system written in PHP. \n\nThe version of Owl Intranet Engine on the remote host fails to sanitize input to the session id cookie before using it in a database query. Provided PHP's 'magic_quotes_gpc' setting is disabled, an unauthenticated attacker may be able to exploit this issue to uncover sensitive information such as password hashes, modify data, launch attacks against the underlying database, etc. \n\nIn addition, the application reportedly suffers from at least one cross-site scripting issue.", "published": "2006-08-17T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=22232", "cvelist": ["CVE-2006-4212", "CVE-2006-4211"], "lastseen": "2016-09-26T17:23:42"}]}}