First published: Thu Mar 18 2004(Updated: )
SQL injection vulnerability in post.php for YaBB SE 1.5.4 and 1.5.5 allows remote attackers to obtain hashed passwords via the quote parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Yabb | =1.5.4 | |
Yabb | =1.5.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0291 is classified as a medium severity vulnerability due to its potential to expose hashed passwords.
The recommended fix for CVE-2004-0291 is to upgrade YaBB SE to version 1.5.6 or later, which addresses this vulnerability.
CVE-2004-0291 affects YaBB SE versions 1.5.4 and 1.5.5.
CVE-2004-0291 is associated with SQL injection attacks that can lead to unauthorized access to hashed passwords.
Yes, CVE-2004-0291 can be exploited remotely by attackers through specially crafted input.