Interpretation conflict in resetpw.php in phpBannerExchange before 2.0 Update 6 allows remote attackers to execute arbitrary SQL commands via an email parameter containing a null (%00) character after a valid e-mail address, which passes the validation check in the eregi PHP command. NOTE: it could be argued that this vulnerability is due to a bug in the eregi PHP command and the proper fix should be in PHP; if so, then this should not be treated as a vulnerability in phpBannerExchange.
| Version | Base score | Base severity | Vector |
|---|
| Hyperlink | Resource Type |
|---|
Interpretation conflict in resetpw.php in phpBannerExchange before 2.0 Update 6 allows remote attackers to execute arbitrary SQL commands via an email parameter containing a null (%00) character after a valid e-mail address, which passes the validation check in the eregi PHP command. NOTE: it could be argued that this vulnerability is due to a bug in the eregi PHP command and the proper fix should be in PHP; if so, then this should not be treated as a vulnerability in phpBannerExchange.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://lists.grok.org.uk/pipermail/full-disclosure/2006-June/046953.html | mailing-list x_refsource_FULLDISC |
| http://www.securityfocus.com/bid/18448 | vdb-entry x_refsource_BID |
| http://www.osvdb.org/26509 | vdb-entry x_refsource_OSVDB |
| http://www.eschew.net/scripts/phpbe/2.0/releasenotes.php | x_refsource_CONFIRM |
| http://www.redteam-pentesting.de/advisories/rt-sa-2006-005.txt | x_refsource_MISC |
| http://www.vupen.com/english/advisories/2006/2358 | vdb-entry x_refsource_VUPEN |
| http://www.securityfocus.com/archive/1/437294/100/0/threaded | mailing-list x_refsource_BUGTRAQ |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/27193 | vdb-entry x_refsource_XF |
| http://secunia.com/advisories/20687 | third-party-advisory x_refsource_SECUNIA |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://lists.grok.org.uk/pipermail/full-disclosure/2006-June/046953.html | mailing-list x_refsource_FULLDISC x_transferred |
| http://www.securityfocus.com/bid/18448 | vdb-entry x_refsource_BID x_transferred |
| http://www.osvdb.org/26509 | vdb-entry x_refsource_OSVDB x_transferred |
| http://www.eschew.net/scripts/phpbe/2.0/releasenotes.php | x_refsource_CONFIRM x_transferred |
| http://www.redteam-pentesting.de/advisories/rt-sa-2006-005.txt | x_refsource_MISC x_transferred |
| http://www.vupen.com/english/advisories/2006/2358 | vdb-entry x_refsource_VUPEN x_transferred |
| http://www.securityfocus.com/archive/1/437294/100/0/threaded | mailing-list x_refsource_BUGTRAQ x_transferred |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/27193 | vdb-entry x_refsource_XF x_transferred |
| http://secunia.com/advisories/20687 | third-party-advisory x_refsource_SECUNIA x_transferred |
Interpretation conflict in resetpw.php in phpBannerExchange before 2.0 Update 6 allows remote attackers to execute arbitrary SQL commands via an email parameter containing a null (%00) character after a valid e-mail address, which passes the validation check in the eregi PHP command. NOTE: it could be argued that this vulnerability is due to a bug in the eregi PHP command and the proper fix should be in PHP; if so, then this should not be treated as a vulnerability in phpBannerExchange.
| Date Added | Due Date | Vulnerability Name | Required Action |
|---|---|---|---|
| N/A |
| Type | Version | Base score | Base severity | Vector |
|---|---|---|---|---|
| Primary | 2.0 | 5.1 | MEDIUM | AV:N/AC:H/Au:N/C:P/I:P/A:P |
| CWE ID | Type | Source |
|---|---|---|
| NVD-CWE-Other | Primary | nvd@nist.gov |