Vulnerability Description
SQL injection vulnerability in redir.asp in VU Mass Mailer allows remote attackers to execute arbitrary SQL commands via the password parameter to Default.asp (aka the Login Page). NOTE: some of these details are obtained from third party information.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Vu | Mass Mailer | All versions |
Related Weaknesses (CWE)
References
- http://aria-security.net/forum/showthread.php?t=447
- http://osvdb.org/38807
- http://secunia.com/advisories/27758Vendor Advisory
- http://www.securityfocus.com/archive/1/484021/100/0/threaded
- http://www.securityfocus.com/bid/26522
- http://www.vupen.com/english/advisories/2007/3966
- http://aria-security.net/forum/showthread.php?t=447
- http://osvdb.org/38807
- http://secunia.com/advisories/27758Vendor Advisory
- http://www.securityfocus.com/archive/1/484021/100/0/threaded
- http://www.securityfocus.com/bid/26522
- http://www.vupen.com/english/advisories/2007/3966
FAQ
What is CVE-2007-6138?
CVE-2007-6138 is a vulnerability with a CVSS score of 7.5 (HIGH). SQL injection vulnerability in redir.asp in VU Mass Mailer allows remote attackers to execute arbitrary SQL commands via the password parameter to Default.asp (aka the Login Page). NOTE: some of thes...
How severe is CVE-2007-6138?
CVE-2007-6138 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-6138?
Check the references section above for vendor advisories and patch information. Affected products include: Vu Mass Mailer.