CVE-2006-1278 (GCVE-0-2006-1278)

Vulnerability from cvelistv5 – Published: 2006-03-19 11:00 – Updated: 2024-08-07 17:03
VLAI?
Summary
SQL injection vulnerability in @1 File Store 2006.03.07 allows remote attackers to execute arbitrary SQL commands via the id parameter to (1) functions.php and (2) user.php in the libs directory, (3) edit.php and (4) delete.php in control/files/, (5) edit.php and (6) delete.php in control/users/, (7) edit.php, (8) access.php, and (9) in control/folders/, (10) access.php and (11) delete.php in control/groups/, (12) confirm.php, and (13) download.php; (14) the email parameter in password.php, and (15) the id parameter in folder.php. NOTE: it was later reported that vectors 12 and 13 also affect @1 File Store PRO 3.2.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.osvdb.org/23855 vdb-entryx_refsource_OSVDB
http://www.osvdb.org/23857 vdb-entryx_refsource_OSVDB
http://www.osvdb.org/23864 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/31063 third-party-advisoryx_refsource_SECUNIA
http://www.osvdb.org/23863 vdb-entryx_refsource_OSVDB
http://www.securityfocus.com/archive/1/428659/100… mailing-listx_refsource_BUGTRAQ
http://www.osvdb.org/23852 vdb-entryx_refsource_OSVDB
http://www.vupen.com/english/advisories/2006/0943 vdb-entryx_refsource_VUPEN
http://www.osvdb.org/23861 vdb-entryx_refsource_OSVDB
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/19224 third-party-advisoryx_refsource_SECUNIA
http://www.attrition.org/pipermail/vim/2009-Augus… mailing-listx_refsource_VIM
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.osvdb.org/23853 vdb-entryx_refsource_OSVDB
http://www.osvdb.org/23860 vdb-entryx_refsource_OSVDB
http://www.osvdb.org/23856 vdb-entryx_refsource_OSVDB
http://securitytracker.com/id?1015826 vdb-entryx_refsource_SECTRACK
http://osvdb.org/47018 vdb-entryx_refsource_OSVDB
http://www.osvdb.org/23858 vdb-entryx_refsource_OSVDB
http://www.osvdb.org/23854 vdb-entryx_refsource_OSVDB
http://osvdb.org/47017 vdb-entryx_refsource_OSVDB
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.securityfocus.com/bid/17090 vdb-entryx_refsource_BID
http://evuln.com/vulns/95/summary.html x_refsource_MISC
http://www.osvdb.org/23851 vdb-entryx_refsource_OSVDB
http://www.osvdb.org/23862 vdb-entryx_refsource_OSVDB
https://www.exploit-db.com/exploits/6040 exploitx_refsource_EXPLOIT-DB
http://securityreason.com/securityalert/619 third-party-advisoryx_refsource_SREASON
http://www.osvdb.org/24106 vdb-entryx_refsource_OSVDB
http://www.securityfocus.com/bid/30182 vdb-entryx_refsource_BID
http://www.osvdb.org/23859 vdb-entryx_refsource_OSVDB
Date Public ?
2006-03-11 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T17:03:28.981Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "23855",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/23855"
          },
          {
            "name": "23857",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/23857"
          },
          {
            "name": "23864",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/23864"
          },
          {
            "name": "31063",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31063"
          },
          {
            "name": "23863",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/23863"
          },
          {
            "name": "20060324 [eVuln] @1 File Store Multiple XSS and SQL Injection Vulnerabilities",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/428659/100/0/threaded"
          },
          {
            "name": "23852",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/23852"
          },
          {
            "name": "ADV-2006-0943",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/0943"
          },
          {
            "name": "23861",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/23861"
          },
          {
            "name": "filestore-multiple-sql-injection(25183)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25183"
          },
          {
            "name": "19224",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19224"
          },
          {
            "name": "20090825 @1 File Store PRO SQL injection - the old gray dupe",
            "tags": [
              "mailing-list",
              "x_refsource_VIM",
              "x_transferred"
            ],
            "url": "http://www.attrition.org/pipermail/vim/2009-August/002246.html"
          },
          {
            "name": "filestorepro-id-sql-injection(43718)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43718"
          },
          {
            "name": "23853",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/23853"
          },
          {
            "name": "23860",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/23860"
          },
          {
            "name": "23856",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/23856"
          },
          {
            "name": "1015826",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015826"
          },
          {
            "name": "47018",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/47018"
          },
          {
            "name": "23858",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/23858"
          },
          {
            "name": "23854",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/23854"
          },
          {
            "name": "47017",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/47017"
          },
          {
            "name": "filestorepro-download-file-include(43724)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43724"
          },
          {
            "name": "17090",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/17090"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://evuln.com/vulns/95/summary.html"
          },
          {
            "name": "23851",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/23851"
          },
          {
            "name": "23862",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/23862"
          },
          {
            "name": "6040",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/6040"
          },
          {
            "name": "619",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/619"
          },
          {
            "name": "24106",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/24106"
          },
          {
            "name": "30182",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/30182"
          },
          {
            "name": "23859",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/23859"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-03-11T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "SQL injection vulnerability in @1 File Store 2006.03.07 allows remote attackers to execute arbitrary SQL commands via the id parameter to (1) functions.php and (2) user.php in the libs directory, (3) edit.php and (4) delete.php in control/files/, (5) edit.php and (6) delete.php in control/users/, (7) edit.php, (8) access.php, and (9) in control/folders/, (10) access.php and (11) delete.php in control/groups/, (12) confirm.php, and (13) download.php; (14) the email parameter in password.php, and (15) the id parameter in folder.php.  NOTE: it was later reported that vectors 12 and 13 also affect @1 File Store PRO 3.2."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-18T14:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "23855",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/23855"
        },
        {
          "name": "23857",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/23857"
        },
        {
          "name": "23864",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/23864"
        },
        {
          "name": "31063",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31063"
        },
        {
          "name": "23863",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/23863"
        },
        {
          "name": "20060324 [eVuln] @1 File Store Multiple XSS and SQL Injection Vulnerabilities",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/428659/100/0/threaded"
        },
        {
          "name": "23852",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/23852"
        },
        {
          "name": "ADV-2006-0943",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/0943"
        },
        {
          "name": "23861",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/23861"
        },
        {
          "name": "filestore-multiple-sql-injection(25183)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25183"
        },
        {
          "name": "19224",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19224"
        },
        {
          "name": "20090825 @1 File Store PRO SQL injection - the old gray dupe",
          "tags": [
            "mailing-list",
            "x_refsource_VIM"
          ],
          "url": "http://www.attrition.org/pipermail/vim/2009-August/002246.html"
        },
        {
          "name": "filestorepro-id-sql-injection(43718)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43718"
        },
        {
          "name": "23853",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/23853"
        },
        {
          "name": "23860",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/23860"
        },
        {
          "name": "23856",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/23856"
        },
        {
          "name": "1015826",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015826"
        },
        {
          "name": "47018",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/47018"
        },
        {
          "name": "23858",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/23858"
        },
        {
          "name": "23854",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/23854"
        },
        {
          "name": "47017",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/47017"
        },
        {
          "name": "filestorepro-download-file-include(43724)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43724"
        },
        {
          "name": "17090",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/17090"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://evuln.com/vulns/95/summary.html"
        },
        {
          "name": "23851",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/23851"
        },
        {
          "name": "23862",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/23862"
        },
        {
          "name": "6040",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/6040"
        },
        {
          "name": "619",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/619"
        },
        {
          "name": "24106",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/24106"
        },
        {
          "name": "30182",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/30182"
        },
        {
          "name": "23859",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/23859"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-1278",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SQL injection vulnerability in @1 File Store 2006.03.07 allows remote attackers to execute arbitrary SQL commands via the id parameter to (1) functions.php and (2) user.php in the libs directory, (3) edit.php and (4) delete.php in control/files/, (5) edit.php and (6) delete.php in control/users/, (7) edit.php, (8) access.php, and (9) in control/folders/, (10) access.php and (11) delete.php in control/groups/, (12) confirm.php, and (13) download.php; (14) the email parameter in password.php, and (15) the id parameter in folder.php.  NOTE: it was later reported that vectors 12 and 13 also affect @1 File Store PRO 3.2."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "23855",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/23855"
            },
            {
              "name": "23857",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/23857"
            },
            {
              "name": "23864",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/23864"
            },
            {
              "name": "31063",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31063"
            },
            {
              "name": "23863",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/23863"
            },
            {
              "name": "20060324 [eVuln] @1 File Store Multiple XSS and SQL Injection Vulnerabilities",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/428659/100/0/threaded"
            },
            {
              "name": "23852",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/23852"
            },
            {
              "name": "ADV-2006-0943",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/0943"
            },
            {
              "name": "23861",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/23861"
            },
            {
              "name": "filestore-multiple-sql-injection(25183)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25183"
            },
            {
              "name": "19224",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19224"
            },
            {
              "name": "20090825 @1 File Store PRO SQL injection - the old gray dupe",
              "refsource": "VIM",
              "url": "http://www.attrition.org/pipermail/vim/2009-August/002246.html"
            },
            {
              "name": "filestorepro-id-sql-injection(43718)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43718"
            },
            {
              "name": "23853",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/23853"
            },
            {
              "name": "23860",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/23860"
            },
            {
              "name": "23856",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/23856"
            },
            {
              "name": "1015826",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015826"
            },
            {
              "name": "47018",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/47018"
            },
            {
              "name": "23858",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/23858"
            },
            {
              "name": "23854",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/23854"
            },
            {
              "name": "47017",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/47017"
            },
            {
              "name": "filestorepro-download-file-include(43724)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43724"
            },
            {
              "name": "17090",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/17090"
            },
            {
              "name": "http://evuln.com/vulns/95/summary.html",
              "refsource": "MISC",
              "url": "http://evuln.com/vulns/95/summary.html"
            },
            {
              "name": "23851",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/23851"
            },
            {
              "name": "23862",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/23862"
            },
            {
              "name": "6040",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/6040"
            },
            {
              "name": "619",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/619"
            },
            {
              "name": "24106",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/24106"
            },
            {
              "name": "30182",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/30182"
            },
            {
              "name": "23859",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/23859"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-1278",
    "datePublished": "2006-03-19T11:00:00.000Z",
    "dateReserved": "2006-03-18T00:00:00.000Z",
    "dateUpdated": "2024-08-07T17:03:28.981Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "epss": {
      "cve": "CVE-2006-1278",
      "date": "2026-04-15",
      "epss": "0.02625",
      "percentile": "0.85689"
    },
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:upoint:\\\\@1_file_store:2006.03.07:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C20CC9D0-7695-42A4-90C2-E1D5BC8B4FC0\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"SQL injection vulnerability in @1 File Store 2006.03.07 allows remote attackers to execute arbitrary SQL commands via the id parameter to (1) functions.php and (2) user.php in the libs directory, (3) edit.php and (4) delete.php in control/files/, (5) edit.php and (6) delete.php in control/users/, (7) edit.php, (8) access.php, and (9) in control/folders/, (10) access.php and (11) delete.php in control/groups/, (12) confirm.php, and (13) download.php; (14) the email parameter in password.php, and (15) the id parameter in folder.php.  NOTE: it was later reported that vectors 12 and 13 also affect @1 File Store PRO 3.2.\"}]",
      "evaluatorSolution": "Successful exploitation requires that the \"magic_quotes_gpc\" parameter is disabled.",
      "id": "CVE-2006-1278",
      "lastModified": "2024-11-21T00:08:29.347",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:P/A:P\", \"baseScore\": 6.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2006-03-19T11:06:00.000",
      "references": "[{\"url\": \"http://evuln.com/vulns/95/summary.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://osvdb.org/47017\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://osvdb.org/47018\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/19224\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31063\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://securityreason.com/securityalert/619\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://securitytracker.com/id?1015826\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://www.attrition.org/pipermail/vim/2009-August/002246.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.osvdb.org/23851\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://www.osvdb.org/23852\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.osvdb.org/23853\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.osvdb.org/23854\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.osvdb.org/23855\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.osvdb.org/23856\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.osvdb.org/23857\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.osvdb.org/23858\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.osvdb.org/23859\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.osvdb.org/23860\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.osvdb.org/23861\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.osvdb.org/23862\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.osvdb.org/23863\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.osvdb.org/23864\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.osvdb.org/24106\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/archive/1/428659/100/0/threaded\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/17090\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/30182\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2006/0943\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/25183\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/43718\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/43724\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://www.exploit-db.com/exploits/6040\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://evuln.com/vulns/95/summary.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://osvdb.org/47017\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://osvdb.org/47018\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/19224\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31063\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://securityreason.com/securityalert/619\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://securitytracker.com/id?1015826\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://www.attrition.org/pipermail/vim/2009-August/002246.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.osvdb.org/23851\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://www.osvdb.org/23852\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.osvdb.org/23853\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.osvdb.org/23854\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.osvdb.org/23855\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.osvdb.org/23856\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.osvdb.org/23857\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.osvdb.org/23858\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.osvdb.org/23859\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.osvdb.org/23860\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.osvdb.org/23861\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.osvdb.org/23862\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.osvdb.org/23863\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.osvdb.org/23864\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.osvdb.org/24106\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/428659/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/17090\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/30182\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2006/0943\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/25183\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/43718\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/43724\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.exploit-db.com/exploits/6040\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "cve@mitre.org",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-89\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2006-1278\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2006-03-19T11:06:00.000\",\"lastModified\":\"2025-04-03T01:03:51.193\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"SQL injection vulnerability in @1 File Store 2006.03.07 allows remote attackers to execute arbitrary SQL commands via the id parameter to (1) functions.php and (2) user.php in the libs directory, (3) edit.php and (4) delete.php in control/files/, (5) edit.php and (6) delete.php in control/users/, (7) edit.php, (8) access.php, and (9) in control/folders/, (10) access.php and (11) delete.php in control/groups/, (12) confirm.php, and (13) download.php; (14) the email parameter in password.php, and (15) the id parameter in folder.php.  NOTE: it was later reported that vectors 12 and 13 also affect @1 File Store PRO 3.2.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-89\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:upoint:\\\\@1_file_store:2006.03.07:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C20CC9D0-7695-42A4-90C2-E1D5BC8B4FC0\"}]}]}],\"references\":[{\"url\":\"http://evuln.com/vulns/95/summary.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://osvdb.org/47017\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://osvdb.org/47018\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/19224\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31063\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securityreason.com/securityalert/619\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://securitytracker.com/id?1015826\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.attrition.org/pipermail/vim/2009-August/002246.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.osvdb.org/23851\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.osvdb.org/23852\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.osvdb.org/23853\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.osvdb.org/23854\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.osvdb.org/23855\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.osvdb.org/23856\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.osvdb.org/23857\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.osvdb.org/23858\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.osvdb.org/23859\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.osvdb.org/23860\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.osvdb.org/23861\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.osvdb.org/23862\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.osvdb.org/23863\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.osvdb.org/23864\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.osvdb.org/24106\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/428659/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/17090\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/30182\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.vupen.com/english/advisories/2006/0943\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/25183\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/43718\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/43724\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.exploit-db.com/exploits/6040\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://evuln.com/vulns/95/summary.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://osvdb.org/47017\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://osvdb.org/47018\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/19224\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31063\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securityreason.com/securityalert/619\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://securitytracker.com/id?1015826\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.attrition.org/pipermail/vim/2009-August/002246.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.osvdb.org/23851\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.osvdb.org/23852\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.osvdb.org/23853\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.osvdb.org/23854\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.osvdb.org/23855\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.osvdb.org/23856\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.osvdb.org/23857\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.osvdb.org/23858\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.osvdb.org/23859\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.osvdb.org/23860\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.osvdb.org/23861\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.osvdb.org/23862\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.osvdb.org/23863\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.osvdb.org/23864\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.osvdb.org/24106\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/428659/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/17090\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/30182\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.vupen.com/english/advisories/2006/0943\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/25183\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/43718\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/43724\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.exploit-db.com/exploits/6040\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"evaluatorSolution\":\"Successful exploitation requires that the \\\"magic_quotes_gpc\\\" parameter is disabled.\"}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…