Vulnerability Description
SQL injection vulnerability in auth.php in PaFileDB 3.1, when authmethod is set to cookies, allows remote attackers to execute arbitrary SQL commands via the username value in the pafiledbcookie cookie.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Php Arena | Pafiledb | 3.1 |
References
- http://marc.info/?l=bugtraq&m=112490781927680&w=2
- http://secunia.com/advisories/16566/Vendor Advisory
- http://www.security-project.org/projects/board/showthread.php?t=947PatchVendor Advisory
- http://www.securityfocus.com/bid/14654Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/21988
- http://marc.info/?l=bugtraq&m=112490781927680&w=2
- http://secunia.com/advisories/16566/Vendor Advisory
- http://www.security-project.org/projects/board/showthread.php?t=947PatchVendor Advisory
- http://www.securityfocus.com/bid/14654Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/21988
FAQ
What is CVE-2005-2723?
CVE-2005-2723 is a vulnerability with a CVSS score of 7.5 (HIGH). SQL injection vulnerability in auth.php in PaFileDB 3.1, when authmethod is set to cookies, allows remote attackers to execute arbitrary SQL commands via the username value in the pafiledbcookie cooki...
How severe is CVE-2005-2723?
CVE-2005-2723 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-2723?
Check the references section above for vendor advisories and patch information. Affected products include: Php Arena Pafiledb.