First published: Sat Dec 15 2007(Updated: )
Multiple SQL injection vulnerabilities in e-Xoops (exoops) 1.08, and 1.05 Rev 1 through 3, allow remote attackers to execute arbitrary SQL commands via the (1) lid parameter to (a) mylinks/ratelink.php, (b) adresses/ratefile.php, (c) mydownloads/ratefile.php, (d) mysections/ratefile.php, and (e) myalbum/ratephoto.php in modules/; the (2) bid parameter to (f) modules/banners/click.php; and the (3) gid parameter to (g) modules/arcade/index.php in a show_stats and play_game action, related issues to CVE-2007-5104 and CVE-2007-6266.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
E-xoops | =1.05_rev3 | |
E-xoops | =1.08 | |
E-xoops | =1.05_rev1 | |
E-xoops | =1.05_rev2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-6380 is considered a medium to high severity vulnerability due to its potential for allowing remote attackers to execute arbitrary SQL commands.
To fix CVE-2007-6380, you should update to the latest version of e-Xoops that has patched the SQL injection vulnerabilities.
CVE-2007-6380 affects e-Xoops versions 1.05 Rev 1 through 3 and 1.08.
The risks of CVE-2007-6380 include unauthorized database access and manipulation, which can lead to data breaches and further exploitation.
Yes, CVE-2007-6380 can be exploited remotely by attackers sending specially crafted requests to affected e-Xoops applications.