First published: Wed Sep 13 2006(Updated: )
Multiple SQL injection vulnerabilities in F-ART BLOG:CMS 4.1 allow remote attackers to execute arbitrary SQL commands via the (1) xagent, (2) xpath, (3) xreferer, and (4) xdns parameters in (a) admin/plugins/NP_Log.php, and the (5) pitem parameter in (b) admin/plugins/NP_Poll.php; and allow remote authenticated users to execute arbitrary SQL commands via the (6) pageRef parameter in (c) admin/plugins/NP_Referrer.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
F-art Agency Blog Cms | =4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-4748 is rated as having a medium severity due to the potential for SQL injection attacks.
To fix CVE-2006-4748, ensure that input validation is properly implemented for the vulnerable parameters and consider updating to a patched version of F-ART BLOG:CMS.
The vulnerable parameters in CVE-2006-4748 are xagent, xpath, xreferer, xdns in NP_Log.php, and pitem in NP_Poll.php.
CVE-2006-4748 affects users of F-ART BLOG:CMS version 4.1.
Yes, CVE-2006-4748 can be exploited remotely by attackers to execute arbitrary SQL commands.