SQL injection vulnerability in Password Protect allows remote attackers to execute arbitrary SQL statements and bypass authentication via (1) admin or Pass parameter to index_next.asp, (2) LoginId, OPass, or NPass to CPassChangePassword.asp, (3) users_edit.asp, or (4) users_add.asp.
References
Link | Resource |
---|---|
http://marc.info/?l=bugtraq&m=109414967003192&w=2 | |
http://secunia.com/advisories/12407 | Vendor Advisory |
http://www.criolabs.net/advisories/passprotect.txt | URL Repurposed |
http://www.securityfocus.com/bid/11073 | Exploit Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17188 |
Configurations
History
No history.
Information
Published : 2004-08-30 04:00
Updated : 2024-02-14 01:17
NVD link : CVE-2004-1647
Mitre link : CVE-2004-1647
CVE.ORG link : CVE-2004-1647
JSON object : View
Products Affected
web_animations
- password_protect
CWE