First published: Wed Aug 26 2009(Updated: )
Multiple SQL injection vulnerabilities in Pligg 9.9 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) id parameter to vote.php, which is not properly handled in libs/link.php; (2) id parameter to trackback.php; (3) an unspecified parameter to submit.php; (4) requestTitle variable in a query to story.php; (5) requestID and (6) requestTitle variables in recommend.php; (7) categoryID parameter to cloud.php; (8) title parameter to out.php; (9) username parameter to login.php; (10) id parameter to cvote.php; and (11) commentid parameter to edit.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Pligg CMS | <=9.9.0 | |
Pligg CMS | =9.5 | |
Pligg CMS | =9.9.0-beta |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-7091 has a medium severity rating due to its potential for remote SQL injection attacks.
To fix CVE-2008-7091, upgrade Pligg CMS to a version later than 9.9.0.
CVE-2008-7091 affects Pligg CMS versions 9.9 and earlier, including version 9.5.
CVE-2008-7091 allows attackers to execute arbitrary SQL commands on the vulnerable systems.
CVE-2008-7091 has SQL injection vulnerabilities in vote.php, trackback.php, and submit.php.