First published: Tue May 13 2008(Updated: )
Multiple SQL injection vulnerabilities in cpLinks 1.03, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary SQL commands via the (1) admin_username parameter (aka the username field) to admin/index.php and the (2) search_text and (3) search_category parameters to search.php. NOTE: some of these details are obtained from third party information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WP Links Page | =1.03 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-2180 is considered a high severity vulnerability due to its potential exploitation through SQL injection attacks.
To fix CVE-2008-2180, ensure that magic_quotes_gpc is enabled or update to a patched version of cpLinks.
CVE-2008-2180 affects the admin_username parameter in admin/index.php and the search_text and search_category parameters in search.php.
Remote attackers can exploit CVE-2008-2180 to execute arbitrary SQL commands affecting vulnerable installations of cpLinks 1.03.
CVE-2008-2180 specifically impacts cpLinks version 1.03 when magic_quotes_gpc is disabled.