Vulnerability Description
SQL injection vulnerability in processlogin.asp in Katy Whitton RankEm allows remote attackers to execute arbitrary SQL commands via the (1) txtusername parameter (aka username field) or the (2) txtpassword parameter (aka password field). NOTE: some of these details are obtained from third party information.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Katywhitton | Rankem | All versions |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/33012Exploit
- http://securityreason.com/securityalert/4746
- http://www.securityfocus.com/bid/32686
- https://exchange.xforce.ibmcloud.com/vulnerabilities/47114
- https://www.exploit-db.com/exploits/7350
- http://secunia.com/advisories/33012Exploit
- http://securityreason.com/securityalert/4746
- http://www.securityfocus.com/bid/32686
- https://exchange.xforce.ibmcloud.com/vulnerabilities/47114
- https://www.exploit-db.com/exploits/7350
FAQ
What is CVE-2008-5589?
CVE-2008-5589 is a vulnerability with a CVSS score of 7.5 (HIGH). SQL injection vulnerability in processlogin.asp in Katy Whitton RankEm allows remote attackers to execute arbitrary SQL commands via the (1) txtusername parameter (aka username field) or the (2) txtpa...
How severe is CVE-2008-5589?
CVE-2008-5589 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-5589?
Check the references section above for vendor advisories and patch information. Affected products include: Katywhitton Rankem.