Korean
<< Back
VID 21503
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The phpMyFAQ, according to its version number, has an SQL injection vulnerability in the username field. phpMyFAQ is a freely available FAQ-system that uses a MySQL database for Microsoft Windows operating systems. phpMyFAQ versions 1.4 and 1.5 allow a remote attacker to execute arbitrary SQL commands, due to the application failing to properly sanitize user-supplied input to the 'username' field of forum entries before using it in a SQL query. This vulnerability could permit a remote attacker to pass malicious input to database queries, potentially resulting in data exposure, modification of the query logic, or even data modification or attacks against the database itself.

* Note: This check solely relied on the version number of the phpMyFaq installed on the remote Web server to assess this vulnerability, so this might be a false positive.

* References:
http://secunia.com/advisories/14516/

* Platforms Affected:
Thorsten Rinne, PhpMyFAQ versions prior to 1.4.7
Thorsten Rinne, PhpMyFAQ 1.5, 1.5 RC1
Microsoft Windows Any version
Recommendation Upgrade to the latest version of phpMyFaq (1.4.7 or 1.5.0 RC2 or later), available from the phpMyFaq Download Web page at http://www.phpmyfaq.de/download.php
Related URL CVE-2005-0702 (CVE)
Related URL 12741 (SecurityFocus)
Related URL 19603 (ISS)