First published: Sun Jul 10 2005(Updated: )
SQL injection vulnerability in the user profile edit module in profile.php for PunBB 1.2.5 and earlier allows remote attackers to execute arbitrary SQL statements via the temp array, which is not initialized before it is used and prevents the attacker-supplied portions of the array from being properly escaped.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PunBB | =1.2.3 | |
PunBB | =1.0_beta2 | |
PunBB | =1.0 | |
PunBB | =1.2.1 | |
PunBB | =1.1.5 | |
PunBB | =1.1 | |
PunBB | =1.0.1 | |
PunBB | =1.1.1 | |
PunBB | =1.0_beta3 | |
PunBB | =1.0_rc1 | |
PunBB | =1.1.3 | |
PunBB | =1.0_rc2 | |
PunBB | =1.0_beta1 | |
PunBB | =1.2.4 | |
PunBB | =1.2.2 | |
PunBB | =1.1.4 | |
PunBB | =1.0_alpha | |
PunBB | =1.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2193 is considered a high severity vulnerability due to its potential to allow arbitrary SQL execution.
To fix CVE-2005-2193, upgrade to PunBB version 1.2.6 or later, where this vulnerability is patched.
CVE-2005-2193 affects PunBB versions 1.2.5 and earlier, including 1.2.4, 1.2.3, 1.1.x and earlier.
CVE-2005-2193 is an SQL injection vulnerability that allows attackers to execute arbitrary SQL statements.
Yes, CVE-2005-2193 can be remotely exploited by attackers through the user profile edit module.