Vulnerability Description
Multiple SQL injection vulnerabilities in DCP-Portal 6 and earlier allow remote attackers to execute arbitrary SQL commands, possibly requiring encoded characters, via (1) the name parameter in register.php, (2) the email parameter in lostpassword.php, (3) the year parameter in calendar.php, and the (4) cid parameter to index.php. NOTE: the mid parameter for forums.php is already associated with CVE-2005-0454. NOTE: the index.php/cid vector was later reported to affect 6.11.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Codeworx Technologies | Dcp-Portal | 3.7 |
Related Weaknesses (CWE)
References
- http://glide.stanford.edu/yichen/research/sec.pdf
- http://marc.info/?l=bugtraq&m=113017151829342&w=2
- http://secunia.com/advisories/12751/ExploitVendor Advisory
- http://securityreason.com/securityalert/108
- http://www.osvdb.org/20493
- http://www.osvdb.org/20494
- http://www.securityfocus.com/archive/1/419280/100/0/threaded
- http://www.securityfocus.com/bid/15183Exploit
- http://www.securityfocus.com/bid/27167
- https://exchange.xforce.ibmcloud.com/vulnerabilities/22855
- https://exchange.xforce.ibmcloud.com/vulnerabilities/39447
- https://www.exploit-db.com/exploits/4853
- http://glide.stanford.edu/yichen/research/sec.pdf
- http://marc.info/?l=bugtraq&m=113017151829342&w=2
- http://secunia.com/advisories/12751/ExploitVendor Advisory
FAQ
What is CVE-2005-3365?
CVE-2005-3365 is a vulnerability with a CVSS score of 7.5 (HIGH). Multiple SQL injection vulnerabilities in DCP-Portal 6 and earlier allow remote attackers to execute arbitrary SQL commands, possibly requiring encoded characters, via (1) the name parameter in regist...
How severe is CVE-2005-3365?
CVE-2005-3365 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-3365?
Check the references section above for vendor advisories and patch information. Affected products include: Codeworx Technologies Dcp-Portal.