First published: Thu Jul 13 2006(Updated: )
** DISPUTED ** Multiple SQL injection vulnerabilities in Invision Power Board (IPB) 1.3 Final allow remote attackers to execute arbitrary SQL commands via the CODE parameter in a (1) Stats, (2) Mail, and (3) Reg action in index.php. NOTE: the developer has disputed this issue, stating that "At no point does the CODE parameter touch the database. The CODE parameter is used in a SWITCH statement to determine which function to run."
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Invisioncommunity Invision Power Board | =1.3.1_final | |
Invisioncommunity Invision Power Board | =1.3_final |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2006-3544 is considered high due to the potential for remote SQL injection attacks.
To fix CVE-2006-3544, it is recommended to upgrade to a patched version of Invision Power Board that resolves these SQL injection vulnerabilities.
CVE-2006-3544 specifically affects Invision Power Board versions 1.3 and 1.3.1 Final.
Yes, CVE-2006-3544 can be exploited by remote attackers without requiring authentication.
CVE-2006-3544 indicates vulnerabilities in the Stats, Mail, and Reg actions within index.php.