Vulnerability Description
SQL injection vulnerability in sessions.inc in PHP Base Library (PHPLib) before 7.4a allows remote attackers to execute arbitrary SQL commands via the id variable, which is set by a client through a query string or a cookie.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Phplib Team | Phplib | 7.4 |
References
- http://secunia.com/advisories/16902PatchVendor Advisory
- http://securitytracker.com/id?1016123Patch
- http://sourceforge.net/project/shownotes.php?group_id=31885&release_id=396091Patch
- http://www.gulftech.org/?node=research&article_id=00107-03052006Vendor Advisory
- http://www.osvdb.org/23466Patch
- http://www.securityfocus.com/bid/16801Patch
- http://www.vupen.com/english/advisories/2006/0720
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24873
- http://secunia.com/advisories/16902PatchVendor Advisory
- http://securitytracker.com/id?1016123Patch
- http://sourceforge.net/project/shownotes.php?group_id=31885&release_id=396091Patch
- http://www.gulftech.org/?node=research&article_id=00107-03052006Vendor Advisory
- http://www.osvdb.org/23466Patch
- http://www.securityfocus.com/bid/16801Patch
- http://www.vupen.com/english/advisories/2006/0720
FAQ
What is CVE-2006-2826?
CVE-2006-2826 is a vulnerability with a CVSS score of 7.5 (HIGH). SQL injection vulnerability in sessions.inc in PHP Base Library (PHPLib) before 7.4a allows remote attackers to execute arbitrary SQL commands via the id variable, which is set by a client through a q...
How severe is CVE-2006-2826?
CVE-2006-2826 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-2826?
Check the references section above for vendor advisories and patch information. Affected products include: Phplib Team Phplib.