CVE-2004-2551 in Helpboxinfo

Summary

Multiple SQL injection vulnerabilities in Layton HelpBox 3.0.1 allow remote attackers to execute arbitrary SQL commands via (1) the sys_comment_id parameter in editcommentenduser.asp, (2) the sys_suspend_id parameter in editsuspensionuser.asp, (3) the table parameter in export_data.asp, (4) the sys_analgroup parameter in manageanalgrouppreference.asp, (5) the sys_asset_id parameter in quickinfoassetrequests.asp, (6) the sys_eusername parameter in quickinfoenduserrequests.asp, and the sys_request_id parameter in (7) requestauditlog.asp, (8) requestcommentsenduser.asp, (9) selectrequestapplytemplate.asp, and (10) selectrequestlink.asp, resulting in an ability to create a new HelpBox user account and read, modify, or delete data from the backend database.

If you want to get best quality of vulnerability data, you may have to visit VulDB.

Reservation

11/21/2005

Disclosure

12/31/2004

CPE

ready

Exploit

Download

CVSS

7.3

EPSS

0.01289

Activities

Very Low

Sources

Do you need the next level of professionalism?

Upgrade your account now!