CVE-2007-6544

critical

Description

Multiple SQL injection vulnerabilities in RunCMS before 1.6.1 allow remote attackers to execute arbitrary SQL commands via the lid parameter to (1) brokenfile.php, (2) visit.php, or (3) ratefile.php in modules/mydownloads/; or (4) ratelink.php, (5) modlink.php, or (6) brokenlink.php in modules/mylinks/.

References

https://www.exploit-db.com/exploits/4790

https://www.exploit-db.com/exploits/4787

https://exchange.xforce.ibmcloud.com/vulnerabilities/39289

http://www.securityfocus.com/archive/1/485512/100/0/threaded

http://www.runcms.org/modules/mydownloads/singlefile.php?lid=131

http://securityreason.com/securityalert/3493

http://osvdb.org/41240

http://osvdb.org/41239

http://osvdb.org/41238

http://osvdb.org/41237

http://osvdb.org/41236

http://osvdb.org/41235

Details

Source: Mitre, NVD

Published: 2007-12-28

Updated: 2024-11-21

Risk Information

CVSS v2

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Severity: High

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical