First published: Fri Dec 31 2004(Updated: )
Dreamweaver MX, when "Using Driver On Testing Server" or "Using DSN on Testing Server" is selected, uploads the mmhttpdb.asp script to the web site but does not require authentication, which allows remote attackers to obtain sensitive information and possibly execute arbitrary SQL commands via a direct request to mmhttpdb.asp.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Dreamweaver 2021 | =4.0 | |
Adobe Dreamweaver 2021 | =6.0 | |
Adobe Dreamweaver 2021 | =6.1 | |
Adobe Dreamweaver 2021 | =2004 | |
Adobe Dreamweaver 2021 | =6.0 | |
Adobe Dreamweaver 2021 | =6.1 | |
Adobe Dreamweaver 2021 | =2004 | |
Adobe Dreamweaver 2021 | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1893 has a high severity rating due to potential exposure of sensitive information and execution of arbitrary SQL commands.
To fix CVE-2004-1893, ensure that the mmhttpdb.asp script is not uploaded to the web server or implement proper authentication measures.
CVE-2004-1893 affects Macromedia Dreamweaver UltraDev 4.0 and multiple versions of Macromedia Dreamweaver including 6.0 and 2004.
Yes, CVE-2004-1893 can enable remote attackers to perform SQL injection attacks due to lack of authentication.
There is no official patch for CVE-2004-1893, and users are advised to upgrade to the latest version of the affected software.