Multiple SQL injection vulnerabilities in PBBoard 2.1.4 allow remote attackers to execute arbitrary SQL commands via the (1) username parameter to the send page, (2) email parameter to the forget page, (3) password parameter to the forum_archive page, (4) section parameter to the management page, (5) section_id parameter to the managementreply page, (6) member_id parameter to the new_password page, or (7) subjectid parameter to the tags page to index.php.
References
Link | Resource |
---|---|
http://osvdb.org/84480 | |
http://secunia.com/advisories/50153 | Vendor Advisory |
http://www.pbboard.com/forums/t10352.html | URL Repurposed |
http://www.pbboard.com/forums/t10353.html | Vendor Advisory URL Repurposed |
http://www.securityfocus.com/bid/54916 | Exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/77501 | |
https://www.htbridge.com/advisory/HTB23101 | Exploit |
Configurations
History
No history.
Information
Published : 2012-08-12 00:55
Updated : 2024-02-14 01:17
NVD link : CVE-2012-4034
Mitre link : CVE-2012-4034
CVE.ORG link : CVE-2012-4034
JSON object : View
Products Affected
pbboard
- pbboard
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')