Vulnerability Description
Multiple SQL injection vulnerabilities in Ip Reg 0.3 allow remote attackers to execute arbitrary SQL commands via the vlan_id parameter to (1) vlanview.php, (2) vlanedit.php, and (3) vlandel.php; the (4) assetclassgroup_id parameter to assetclassgroupview.php; the (5) subnet_id parameter to nodelist.php; and unspecified other vectors. NOTE: it was later reported that the vlanview.php and vlandel.php vectors are also in 0.4.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ip Reg | Ip Reg | 0.3 |
Related Weaknesses (CWE)
References
- http://osvdb.org/39776
- http://osvdb.org/39777
- http://osvdb.org/39778
- http://osvdb.org/39779
- http://osvdb.org/39780
- http://www.inj3ct-it.org/exploit/ipreg0.3.txt
- http://www.securityfocus.com/bid/26993Exploit
- https://www.exploit-db.com/exploits/4771
- http://osvdb.org/39776
- http://osvdb.org/39777
- http://osvdb.org/39778
- http://osvdb.org/39779
- http://osvdb.org/39780
- http://www.inj3ct-it.org/exploit/ipreg0.3.txt
- http://www.securityfocus.com/bid/26993Exploit
FAQ
What is CVE-2007-6579?
CVE-2007-6579 is a vulnerability with a CVSS score of 7.5 (HIGH). Multiple SQL injection vulnerabilities in Ip Reg 0.3 allow remote attackers to execute arbitrary SQL commands via the vlan_id parameter to (1) vlanview.php, (2) vlanedit.php, and (3) vlandel.php; the ...
How severe is CVE-2007-6579?
CVE-2007-6579 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-6579?
Check the references section above for vendor advisories and patch information. Affected products include: Ip Reg Ip Reg.