| VID |
21940 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The Invision Power Board, according to its version number has an SQL injection vulnerability in the 'CLIENT_IP' parameter. Invision Power Board is a PHP-based Web forum software package, distributed by Invision Power Services, Inc.. Invision Power Board versions 2.1 through 2.1.6 could allow a remote attacker to execute specially-crafted SQL commands, caused due to an input validation error in the 'classes/class_session.php' script that does not validate the 'CLIENT_IP' variable before being used in SQL statements. This vulnerability could permit a remote attacker to pass malicious input to database queries, potentially resulting in data exposure, modification of the query logic, or even data modification or attacks against the database itself.
* Note: This check solely relied on the version number of Invision Power Board on the remote Web server to assess this vulnerability, so this might be a false positive.
* References: http://forums.invisionpower.com/index.php?autocom=bugtracker&code=show_bug&bug_title_id=2043&bug_cat_id=3 http://archives.neohapsis.com/archives/bugtraq/2006-07/0249.html http://www.frsirt.com/english/advisories/2006/2810 http://www.milw0rm.com/exploits/2010
* Platforms Affected: Invisionize, Invision Power Board versions 2.1 through to 2.1.6 Any operating system Any version |
| Recommendation |
Upgrade to the latest version of Invision Power Board (2.1.7 or later), available from the Invision Power Services Web site at http://www.invisionpower.com/ip.dynamic/products/blog/index.html |
| Related URL |
CVE-2006-7071 (CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
27753 (ISS) |
|