Vulnerability Description
registration.PHP in ATutor 1.5.1 pl2 allows remote attackers to execute arbitrary SQL commands via an e-mail address that ends in a NULL character, which bypasses the PHP regular expression check. NOTE: it is possible that this is actually a bug in PHP code, in which case this should not be treated as a vulnerability in ATutor.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Adaptive Technology Resource Centre | Atutor | 1.5.1_pl2 |
References
- http://rgod.altervista.org/atutor151pl2.htmlExploitVendor Advisory
- http://securitytracker.com/alerts/2005/Nov/1015166.html
- http://www.osvdb.org/20851
- http://www.securityfocus.com/bid/15355/Exploit
- http://rgod.altervista.org/atutor151pl2.htmlExploitVendor Advisory
- http://securitytracker.com/alerts/2005/Nov/1015166.html
- http://www.osvdb.org/20851
- http://www.securityfocus.com/bid/15355/Exploit
FAQ
What is CVE-2005-4155?
CVE-2005-4155 is a vulnerability with a CVSS score of 7.5 (HIGH). registration.PHP in ATutor 1.5.1 pl2 allows remote attackers to execute arbitrary SQL commands via an e-mail address that ends in a NULL character, which bypasses the PHP regular expression check. NOT...
How severe is CVE-2005-4155?
CVE-2005-4155 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-4155?
Check the references section above for vendor advisories and patch information. Affected products include: Adaptive Technology Resource Centre Atutor.