|
|||
Rule General Information |
---|
Release Date: | 2020-09-04 | |
Rule Name: | PHP-Stats php-stats.recphp.php SQL Injection Vulnerability (CVE-2006-7172) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | Multiple SQL injection vulnerabilities in php-stats.recphp.php in PHP-Stats 0.1.9.1b and earlier allow remote attackers to execute arbitrary code via a leading dotted-quad IP address string in the (1) PC-REMOTE-ADDR HTTP header, which is inserted into $_SERVER['HTTP_PC_REMOTE_ADDR'], or (2) ip parameter. | |
Impact: | An attacker can inject arbitrary sql commands to view or change the database of the target by exploiting the vulnerability successfully. | |
Affected OS: | Windows, Linux, Other Unix, Network Device | |
Reference: | ExploitDB:3496 http://www.vupen.com/english/advisories/2007/1004 https://exchange.xforce.ibmcloud.com/vulnerabilities/33031 ExploitDB:3497 |
|
Solutions |
---|
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product. |