{"api_version":"1","generated_at":"2026-04-21T16:49:49+00:00","cve":"CVE-2008-1496","urls":{"html":"https://cve.report/CVE-2008-1496","api":"https://cve.report/api/cve/CVE-2008-1496.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2008-1496","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2008-1496"},"summary":{"title":"CVE-2008-1496","description":"Multiple SQL injection vulnerabilities in PEEL, possibly 3.x and earlier, allow remote attackers to execute arbitrary SQL commands via the (1) email parameter to (a) membre.php, and the (2) timestamp parameter to (b) the details action in achat/historique_commandes.php and (c) the facture action in factures/facture_html.php.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2008-03-25 19:44:00","updated_at":"2017-09-29 01:30:00"},"problem_types":["CWE-89"],"metrics":[],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/41353","name":"peel-membre-sql-injection(41353)","refsource":"XF","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/28346","name":"28346","refsource":"BID","tags":["Exploit"],"title":"PEEL Multiple SQL Injection Vulnerabilities and Arbitrary File Upload Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://realn.free.fr/releases/70207","name":"http://realn.free.fr/releases/70207","refsource":"MISC","tags":["Exploit"],"title":"Free Pages Personnelles: Erreur 404 - Document non trouvé","mime":"text/x-php","httpstatus":"404","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/41341","name":"peel-timestamp-sql-injection(41341)","refsource":"XF","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/29466","name":"29466","refsource":"SECUNIA","tags":["Vendor Advisory"],"title":"PEEL Multiple Vulnerabilities - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.exploit-db.com/exploits/5281","name":"5281","refsource":"EXPLOIT-DB","tags":[],"title":"PEEL CMS Admin Hash Extraction and Remote Upload Exploit","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2008-1496","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-1496","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2008","cve_id":"1496","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"peel","cpe5":"peel","cpe6":"1.0b","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1496","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"peel","cpe5":"peel","cpe6":"2.6","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1496","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"peel","cpe5":"peel","cpe6":"2.7","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1496","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"peel","cpe5":"peel","cpe6":"1.0b","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1496","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"peel","cpe5":"peel","cpe6":"2.6","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1496","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"peel","cpe5":"peel","cpe6":"2.7","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2008-1496","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Multiple SQL injection vulnerabilities in PEEL, possibly 3.x and earlier, allow remote attackers to execute arbitrary SQL commands via the (1) email parameter to (a) membre.php, and the (2) timestamp parameter to (b) the details action in achat/historique_commandes.php and (c) the facture action in factures/facture_html.php."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"peel-timestamp-sql-injection(41341)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/41341"},{"name":"29466","refsource":"SECUNIA","url":"http://secunia.com/advisories/29466"},{"name":"5281","refsource":"EXPLOIT-DB","url":"https://www.exploit-db.com/exploits/5281"},{"name":"28346","refsource":"BID","url":"http://www.securityfocus.com/bid/28346"},{"name":"http://realn.free.fr/releases/70207","refsource":"MISC","url":"http://realn.free.fr/releases/70207"},{"name":"peel-membre-sql-injection(41353)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/41353"}]}},"nvd":{"publishedDate":"2008-03-25 19:44:00","lastModifiedDate":"2017-09-29 01:30:00","problem_types":["CWE-89"],"metrics":{"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":7.5},"severity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:peel:peel:2.7:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:peel:peel:2.6:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:peel:peel:1.0b:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2008","CveId":"1496","Ordinal":"31401","Title":"CVE-2008-1496","CVE":"CVE-2008-1496","Year":"2008"},"notes":[{"CveYear":"2008","CveId":"1496","Ordinal":"1","NoteData":"Multiple SQL injection vulnerabilities in PEEL, possibly 3.x and earlier, allow remote attackers to execute arbitrary SQL commands via the (1) email parameter to (a) membre.php, and the (2) timestamp parameter to (b) the details action in achat/historique_commandes.php and (c) the facture action in factures/facture_html.php.","Type":"Description","Title":null},{"CveYear":"2008","CveId":"1496","Ordinal":"2","NoteData":"2008-03-25","Type":"Other","Title":"Published"},{"CveYear":"2008","CveId":"1496","Ordinal":"3","NoteData":"2017-09-28","Type":"Other","Title":"Modified"}]}}}