Vulnerability Name:

CVE-2004-2350 (CCN-15475)

Assigned:2004-03-14
Published:2004-03-14
Updated:2017-07-11
Summary:SQL injection vulnerability in search.php for phpBB 1.0 through 2.0.6 allows remote attackers to execute arbitrary SQL and gain privileges via the search_results parameter.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Data Manipulation
References:Source: CCN
Type: BugTraq Mailing List, Sun Mar 14 2004 - 12:32:20 CST
[SCAN Associates Sdn Bhd Security Advisory] phpBB 2.0.6 and below sql injection

Source: MITRE
Type: CNA
CVE-2004-2350

Source: CCN
Type: OSVDB ID: 4258
phpBB search.php search_results Parameter SQL Injection

Source: CCN
Type: phpBB Web site
phpBB.com

Source: BUGTRAQ
Type: Exploit, Vendor Advisory
20040314 [SCAN Associates Sdn Bhd Security Advisory] phpBB 2.0.6 and below sql injection

Source: BID
Type: Exploit, Patch
9883

Source: CCN
Type: BID-9883
PHPBB Search.PHP Search_Results Parameter SQL Injection Vulnerability

Source: XF
Type: UNKNOWN
phpbb-config-sql-injection(15475)

Source: XF
Type: UNKNOWN
phpbb-config-sql-injection(15475)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:phpbb_group:phpbb:1.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:1.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:1.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:1.4.0:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:1.4.1:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:1.4.2:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:1.4.4:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:2.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:2.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:2.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:2.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:2.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:2.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:2.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:2.0_beta1:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:2.0_rc1:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:2.0_rc2:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:2.0_rc3:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:2.0_rc4:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    phpbb_group phpbb 1.0.0
    phpbb_group phpbb 1.2.0
    phpbb_group phpbb 1.2.1
    phpbb_group phpbb 1.4.0
    phpbb_group phpbb 1.4.1
    phpbb_group phpbb 1.4.2
    phpbb_group phpbb 1.4.4
    phpbb_group phpbb 2.0.0
    phpbb_group phpbb 2.0.1
    phpbb_group phpbb 2.0.2
    phpbb_group phpbb 2.0.3
    phpbb_group phpbb 2.0.4
    phpbb_group phpbb 2.0.5
    phpbb_group phpbb 2.0.6
    phpbb_group phpbb 2.0_beta1
    phpbb_group phpbb 2.0_rc1
    phpbb_group phpbb 2.0_rc2
    phpbb_group phpbb 2.0_rc3
    phpbb_group phpbb 2.0_rc4