Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
Multiple SQL injection vulnerabilities in TorrentTrader Classic 1.09 allow remote authenticated users to execute arbitrary SQL commands via (1) the origmsg parameter to account-inbox.php; the categ parameter to (2) delreq.php and (3) admin-delreq.php; (4) the choice parameter to index.php; (5) the id parameter to modrules.php in an edited (aka edit) action; the (6) user, (7) torrent, (8) forumid, and (9) forumpost parameters to report.php; (10) the delmp parameter to take-deletepm.php; (11) the delreport parameter to takedelreport.php; (12) the delreq parameter to takedelreq.php; (13) the clases parameter to takestaffmess.php; and (14) the warndisable parameter to takewarndisable.php; and allow remote attackers to execute arbitrary SQL commands via (15) the wherecatin parameter to browse.php, (16) the limit parameter to today.php, and (17) the where parameter to torrents-details.php.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
TorrentTrader Classic 多个SQL注入漏洞
Vulnerability Description
TorrentTrader是用PHP编写的torrent tracker平台 。 TorrentTrader Classic 存在多个SQL注入漏洞,远程认证用户可以通过多个方法执行任意SQL命令: 1) 在删除消息时account-inbox.php中没有正确地过滤对origmsg参数的输入,可能导致SQL注入攻击。成功利用这个漏洞需要有效的户凭据 。 2) 没有正确地限制对backup-database.php脚本的访问。此外,该脚本在公开可访问的文件夹中创建了带有易猜测文件名的数据库dum。 3)
CVSS Information
N/A
Vulnerability Type
N/A