| Title | Article Friendly Standard の categorydetail.php における SQL インジェクションの脆弱性 |
|---|---|
| Summary | Article Friendly Standard の categorydetail.php には、SQL インジェクションの脆弱性が存在します。 |
| Possible impacts | 第三者により、Cat パラメータを介して、任意の SQL コマンドを実行される可能性があります。 |
| Solution | ベンダ情報および参考情報を参照して適切な対策を実施してください。 |
| Publication Date | Aug. 12, 2008, midnight |
| Registration Date | June 26, 2012, 4:02 p.m. |
| Last Update | June 26, 2012, 4:02 p.m. |
| CVSS2.0 : 警告 | |
| Score | 6.8 |
|---|---|
| Vector | AV:N/AC:M/Au:N/C:P/I:P/A:P |
| articlefriendly |
| article friendly Standard |
| No | Changed Details | Date of change |
|---|---|---|
| 0 | [2012年06月26日] 掲載 |
Feb. 17, 2018, 10:37 a.m. |
| Summary | SQL injection vulnerability in categorydetail.php in Article Friendly Standard allows remote attackers to execute arbitrary SQL commands via the Cat parameter. |
|---|---|
| Summary | Regarding Access Complexity: http://secunia.com/advisories/31292: "Input passed to the "autid" parameter in authordetail.php and to the "Cat" parameter in categorydetail.php is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Successful exploitation requires that "magic_quotes_gpc" is disabled." |
| Publication Date | Aug. 13, 2008, 9:41 a.m. |
| Registration Date | Jan. 29, 2021, 1:40 p.m. |
| Last Update | Sept. 29, 2017, 10:31 a.m. |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:a:articlefriendly:article_friendly:*:*:standard:*:*:*:*:* | |||||