First published: Wed Sep 13 2006(Updated: )
Multiple SQL injection vulnerabilities in tiki-g-admin_processes.php in Tikiwiki 1.9.4 allow remote attackers to execute arbitrary SQL commands via the (1) pid and (2) where parameters.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tiki Wiki CMS Groupware | =1.9.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-4734 is considered a high severity vulnerability due to its potential for SQL injection attacks.
To fix CVE-2006-4734, it is recommended to upgrade to a more secure version of Tikiwiki that is not susceptible to SQL injection vulnerabilities.
CVE-2006-4734 is caused by improper validation of user input in the tiki-g-admin_processes.php file, allowing SQL commands to be executed by attackers.
CVE-2006-4734 affects users of Tikiwiki version 1.9.4 specifically.
Exploiting CVE-2006-4734 can allow remote attackers to execute arbitrary SQL commands, compromising the integrity and confidentiality of the database.