Vulnerability Description
SQL injection vulnerability in WebspotBlogging 3.0 allows remote attackers to execute arbitrary SQL commands and bypass authentication via the username parameter to login.php.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Webspot | Webspotblogging | 3.0 |
References
- http://evuln.com/vulns/41/summary.htmlExploitVendor Advisory
- http://secunia.com/advisories/18560
- http://securityreason.com/securityalert/356
- http://securitytracker.com/id?1015522
- http://www.osvdb.org/22670
- http://www.securityfocus.com/archive/1/422364/100/0/threaded
- http://www.securityfocus.com/bid/16319Exploit
- http://www.vupen.com/english/advisories/2006/0268
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24222
- https://sourceforge.net/forum/forum.php?forum_id=532233
- https://sourceforge.net/project/shownotes.php?release_id=387180&group_id=156586
- http://evuln.com/vulns/41/summary.htmlExploitVendor Advisory
- http://secunia.com/advisories/18560
- http://securityreason.com/securityalert/356
- http://securitytracker.com/id?1015522
FAQ
What is CVE-2006-0324?
CVE-2006-0324 is a vulnerability with a CVSS score of 7.5 (HIGH). SQL injection vulnerability in WebspotBlogging 3.0 allows remote attackers to execute arbitrary SQL commands and bypass authentication via the username parameter to login.php.
How severe is CVE-2006-0324?
CVE-2006-0324 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-0324?
Check the references section above for vendor advisories and patch information. Affected products include: Webspot Webspotblogging.