| VID |
21503 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The phpMyFAQ, according to its version number, has an SQL injection vulnerability in the username field. phpMyFAQ is a freely available FAQ-system that uses a MySQL database for Microsoft Windows operating systems. phpMyFAQ versions 1.4 and 1.5 allow a remote attacker to execute arbitrary SQL commands, due to the application failing to properly sanitize user-supplied input to the 'username' field of forum entries before using it in a SQL query. This vulnerability could permit a remote attacker to pass malicious input to database queries, potentially resulting in data exposure, modification of the query logic, or even data modification or attacks against the database itself.
* Note: This check solely relied on the version number of the phpMyFaq installed on the remote Web server to assess this vulnerability, so this might be a false positive.
* References: http://secunia.com/advisories/14516/
* Platforms Affected: Thorsten Rinne, PhpMyFAQ versions prior to 1.4.7 Thorsten Rinne, PhpMyFAQ 1.5, 1.5 RC1 Microsoft Windows Any version |
| Recommendation |
Upgrade to the latest version of phpMyFaq (1.4.7 or 1.5.0 RC2 or later), available from the phpMyFaq Download Web page at http://www.phpmyfaq.de/download.php |
| Related URL |
CVE-2005-0702 (CVE) |
| Related URL |
12741 (SecurityFocus) |
| Related URL |
19603 (ISS) |
|