Vulnerability Description
SQL injection vulnerability in index.php in GameSiteScript (gss) 3.1 and earlier allows remote attackers to execute arbitrary SQL commands via the params parameter, related to missing input validation of the id field.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gamesitescript | Gamesitescript | <= 3.1 |
References
- http://osvdb.org/36362
- http://secunia.com/advisories/25983
- http://www.securityfocus.com/bid/24807
- http://www.vupen.com/english/advisories/2007/2460
- https://exchange.xforce.ibmcloud.com/vulnerabilities/35292
- https://www.exploit-db.com/exploits/4159
- http://osvdb.org/36362
- http://secunia.com/advisories/25983
- http://www.securityfocus.com/bid/24807
- http://www.vupen.com/english/advisories/2007/2460
- https://exchange.xforce.ibmcloud.com/vulnerabilities/35292
- https://www.exploit-db.com/exploits/4159
FAQ
What is CVE-2007-3631?
CVE-2007-3631 is a vulnerability with a CVSS score of 7.5 (HIGH). SQL injection vulnerability in index.php in GameSiteScript (gss) 3.1 and earlier allows remote attackers to execute arbitrary SQL commands via the params parameter, related to missing input validation...
How severe is CVE-2007-3631?
CVE-2007-3631 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-3631?
Check the references section above for vendor advisories and patch information. Affected products include: Gamesitescript Gamesitescript.