Php-Stats Multiple Input Validation Vulnerabilities
BID:26022
Info
Php-Stats Multiple Input Validation Vulnerabilities
| Bugtraq ID: | 26022 |
| Class: | Input Validation Error |
| CVE: |
CVE-2007-5453 CVE-2007-5452 |
| Remote: | Yes |
| Local: | No |
| Published: | Oct 11 2007 12:00AM |
| Updated: | Jul 05 2016 09:38PM |
| Credit: | EgiX is credited with the discovery of these vulnerabilities. |
| Vulnerable: |
PhpStats PHP-Stats 0.1.9 .2 |
| Not Vulnerable: | |
Discussion
Php-Stats Multiple Input Validation Vulnerabilities
Php-Stats is prone to multiple input-validation vulnerabilities, including multiple remote code-execution issues and multiple SQL-injection issues.
An attacker can exploit these issues to compromise the application, execute arbitrary code within the context of the webserver process, access or modify data, or exploit latent vulnerabilities in the underlying database.
These issues affect Php-Stats 0.1.9.2; other versions may also be vulnerable.
Php-Stats is prone to multiple input-validation vulnerabilities, including multiple remote code-execution issues and multiple SQL-injection issues.
An attacker can exploit these issues to compromise the application, execute arbitrary code within the context of the webserver process, access or modify data, or exploit latent vulnerabilities in the underlying database.
These issues affect Php-Stats 0.1.9.2; other versions may also be vulnerable.
Exploit / POC
Php-Stats Multiple Input Validation Vulnerabilities
Attackers can use a browser to exploit these issues.
The following exploit is available:
Attackers can use a browser to exploit these issues.
The following exploit is available:
Solution / Fix
Php-Stats Multiple Input Validation Vulnerabilities
Solution:
Currently we are not aware of any vendor-supplied patches for these issues. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches for these issues. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].