First published: Thu Mar 09 2006(Updated: )
Multiple SQL injection vulnerabilities in Pixelpost 1.5 beta 1 and earlier allow remote attackers to execute arbitrary SQL commands via (1) the showimage parameter in index.php; and the (2) USER_AGENT, (3) HTTP_REFERER, and (4) HTTP_HOST HTTP header fields as used in the book_vistor function in includes/functions.php. NOTE: the vendor has disputed some issues from the original disclosure, but due to the vagueness of the dispute, it is not clear whether the vendor is disputing this particular issue.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Pixelpost | =1.4.3 | |
Pixelpost | =1.5_beta1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2006-1104 is considered high due to its potential for remote SQL injection vulnerabilities.
To fix CVE-2006-1104, upgrade to Pixelpost version 1.5 or later, which addresses these vulnerabilities.
CVE-2006-1104 affects Pixelpost versions 1.5 beta 1 and earlier, specifically 1.4.3.
CVE-2006-1104 allows attackers to execute arbitrary SQL commands that could compromise the database.
CVE-2006-1104 vulnerabilities exist in the showimage parameter and specific HTTP header fields used in the book_visitor function.