Vulnerability Description
Multiple SQL injection vulnerabilities in index.php in PHP Inventory 1.2 allow (1) remote authenticated users to execute arbitrary SQL commands via the user_id parameter in a users details action, and allow remote attackers to execute arbitrary SQL commands via the (2) user (username) and (3) pass (password) parameters. NOTE: some of these details are obtained from third party information.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Phpwares | Php Inventory | 1.2 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.org/0912-exploits/phpinventory-sql.txtExploit
- http://secunia.com/advisories/37672Vendor Advisory
- http://www.exploit-db.com/exploits/10370Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/54666
- http://packetstormsecurity.org/0912-exploits/phpinventory-sql.txtExploit
- http://secunia.com/advisories/37672Vendor Advisory
- http://www.exploit-db.com/exploits/10370Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/54666
FAQ
What is CVE-2009-4597?
CVE-2009-4597 is a vulnerability with a CVSS score of 7.5 (HIGH). Multiple SQL injection vulnerabilities in index.php in PHP Inventory 1.2 allow (1) remote authenticated users to execute arbitrary SQL commands via the user_id parameter in a users details action, and...
How severe is CVE-2009-4597?
CVE-2009-4597 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2009-4597?
Check the references section above for vendor advisories and patch information. Affected products include: Phpwares Php Inventory.