Description
Multiple SQL injection vulnerabilities in the admin section in e107 0.7.5 allow remote authenticated administrative users to execute arbitrary SQL commands via the (1) linkopentype, (2) linkrender, (3) link_class, and (4) link_id parameters in (a) links.php; the (5) searchquery parameter in (b) users.php; and the (6) download_category_class parameter in (c) download.php. NOTE: an e107 developer has disputed the significance of the vulnerability, stating that "If your admins are injecting you, you might want to reconsider their access."
Exploits
No known exploits found for this CVE.
Search Exploit-DBReferences
cve@mitre.org
http://securityreason.com/securityalert/1569af854a3a-2127-422b-91ae-364da2661108
http://e107.org/e107_plugins/bugtrack/bugtrack.php?id=3195&action=showaf854a3a-2127-422b-91ae-364da2661108
http://securityreason.com/securityalert/1569af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/445005/100/100/threaded