First published: Tue Dec 20 2005(Updated: )
Multiple SQL injection vulnerabilities in Cerberus Helpdesk allow remote attackers to execute arbitrary SQL commands via the (1) file_id parameter to attachment_send.php, (2) the $addy variable in email_parser.php, (3) $address variable in email_parser.php, (4) $a_address variable in structs.php, (5) kbid parameter to cer_KnowledgebaseHandler.class.php, (6) queues[] parameter to addresses_export.php, (7) $thread variable to display.php, (8) ticket parameter to display_ticket_thread.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Webgroupmedia Cerberus Helpdesk | =2.649 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-4427 has a medium severity rating, indicating a significant risk to affected systems.
Fixing CVE-2005-4427 involves updating Cerberus Helpdesk to the latest version to mitigate the SQL injection vulnerabilities.
CVE-2005-4427 specifically affects Cerberus Helpdesk version 2.649.
CVE-2005-4427 can be exploited to execute arbitrary SQL commands, leading to unauthorized access to the database.
Organizations using Cerberus Helpdesk version 2.649 are at risk if they do not apply the necessary updates to address the vulnerabilities.