Vulnerability Description
SQL injection vulnerability in admin/index.php in w3b>cms (aka w3blabor CMS) before 3.4.0, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the benutzername parameter (aka Username field) in a login action.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| W3B Cms | Aka W3Blabor Cms | <= 3.3.0 |
Related Weaknesses (CWE)
References
- http://forum.w3bcms.de/viewtopic.php?f=5&t=256Vendor Advisory
- http://osvdb.org/51108
- http://secunia.com/advisories/33364Vendor Advisory
- http://www.securityfocus.com/bid/33082ExploitPatch
- https://www.exploit-db.com/exploits/7640
- http://forum.w3bcms.de/viewtopic.php?f=5&t=256Vendor Advisory
- http://osvdb.org/51108
- http://secunia.com/advisories/33364Vendor Advisory
- http://www.securityfocus.com/bid/33082ExploitPatch
- https://www.exploit-db.com/exploits/7640
FAQ
What is CVE-2009-0597?
CVE-2009-0597 is a vulnerability with a CVSS score of 6.8 (MEDIUM). SQL injection vulnerability in admin/index.php in w3b>cms (aka w3blabor CMS) before 3.4.0, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the benutzer...
How severe is CVE-2009-0597?
CVE-2009-0597 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2009-0597?
Check the references section above for vendor advisories and patch information. Affected products include: W3B Cms Aka W3Blabor Cms.