Vulnerability Description
SQL injection vulnerability in the Johannes Hass gaestebuch 2.2 module for PHP-Nuke allows remote attackers to execute arbitrary SQL commands via the id parameter in an edit action to modules.php.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Johannes Hass | Gaestebuch Module | 2.2 |
| Phpnuke | Php-Nuke | All versions |
Related Weaknesses (CWE)
References
- http://cod3rz.helloweb.eu/exploits/gaestebuch.txtExploit
- http://marc.info/?l=bugtraq&m=120440053123054&w=2Exploit
- http://www.securityfocus.com/bid/28063
- https://exchange.xforce.ibmcloud.com/vulnerabilities/40975
- http://cod3rz.helloweb.eu/exploits/gaestebuch.txtExploit
- http://marc.info/?l=bugtraq&m=120440053123054&w=2Exploit
- http://www.securityfocus.com/bid/28063
- https://exchange.xforce.ibmcloud.com/vulnerabilities/40975
FAQ
What is CVE-2008-1314?
CVE-2008-1314 is a vulnerability with a CVSS score of 7.5 (HIGH). SQL injection vulnerability in the Johannes Hass gaestebuch 2.2 module for PHP-Nuke allows remote attackers to execute arbitrary SQL commands via the id parameter in an edit action to modules.php.
How severe is CVE-2008-1314?
CVE-2008-1314 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-1314?
Check the references section above for vendor advisories and patch information. Affected products include: Johannes Hass Gaestebuch Module, Phpnuke Php-Nuke.