ID

VAR-200807-0232


CVE

CVE-2008-3245


TITLE

phpHoo3 'phpHoo3.php' SQL Injection Vulnerability

Trust: 0.9

sources: BID: 30271 // CNNVD: CNNVD-200807-350

DESCRIPTION

SQL injection vulnerability in phpHoo3.php in phpHoo3 4.3.9, 4.3.10, 4.4.8, and 5.2.6 allows remote attackers to execute arbitrary SQL commands via the viewCat parameter. phpHoo3 is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. phpHoo3 is a yahoo-like link management software. ---------------------------------------------------------------------- Want a new job? http://secunia.com/secunia_security_specialist/ http://secunia.com/hardcore_disassembler_and_reverse_engineer/ International Partner Manager - Project Sales in the IT-Security Industry: http://corporate.secunia.com/about_secunia/64/ ---------------------------------------------------------------------- TITLE: phpHoo3 "viewCat" SQL Injection Vulnerability SECUNIA ADVISORY ID: SA31130 VERIFY ADVISORY: http://secunia.com/advisories/31130/ CRITICAL: Moderately critical IMPACT: Manipulation of data WHERE: >From remote SOFTWARE: phpHoo3 http://secunia.com/product/19341/ DESCRIPTION: Mr.SQL has discovered a vulnerability in phpHoo3, which can be exploited by malicious people to conduct SQL injection attacks. Input passed to the "viewCat" parameter in phpHoo3.php is not properly sanitised before being used in SQL queries. SOLUTION: Edit the source code to ensure that input is properly sanitised. PROVIDED AND/OR DISCOVERED BY: Mr.SQL ORIGINAL ADVISORY: http://milw0rm.com/exploits/6091 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2008-3245 // JVNDB: JVNDB-2008-003269 // BID: 30271 // VULHUB: VHN-33370 // PACKETSTORM: 68326

AFFECTED PRODUCTS

vendor:cable modemsmodel:phphoo3scope:eqversion:4.3.9

Trust: 2.4

vendor:cable modemsmodel:phphoo3scope:eqversion:4.3.10

Trust: 2.4

vendor:cable modemsmodel:phphoo3scope:eqversion:4.4.8

Trust: 2.4

vendor:cable modemsmodel:phphoo3scope:eqversion:5.2.6

Trust: 1.6

vendor:cable modemsmodel:phphoo3scope:eqversion:and 5.2.6

Trust: 0.8

vendor:phphoo3model:phphoo3scope:eqversion:0

Trust: 0.3

sources: BID: 30271 // JVNDB: JVNDB-2008-003269 // CNNVD: CNNVD-200807-350 // NVD: CVE-2008-3245

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-3245
value: HIGH

Trust: 1.0

NVD: CVE-2008-3245
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200807-350
value: HIGH

Trust: 0.6

VULHUB: VHN-33370
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2008-3245
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-33370
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-33370 // JVNDB: JVNDB-2008-003269 // CNNVD: CNNVD-200807-350 // NVD: CVE-2008-3245

PROBLEMTYPE DATA

problemtype:CWE-89

Trust: 1.9

sources: VULHUB: VHN-33370 // JVNDB: JVNDB-2008-003269 // NVD: CVE-2008-3245

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200807-350

TYPE

sql injection

Trust: 0.7

sources: PACKETSTORM: 68326 // CNNVD: CNNVD-200807-350

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-003269

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-33370

PATCH

title:Top Pageurl:http://cable-modems.org/phpHoo/

Trust: 0.8

sources: JVNDB: JVNDB-2008-003269

EXTERNAL IDS

db:NVDid:CVE-2008-3245

Trust: 2.8

db:BIDid:30271

Trust: 2.0

db:SECUNIAid:31130

Trust: 1.9

db:EXPLOIT-DBid:6091

Trust: 1.8

db:JVNDBid:JVNDB-2008-003269

Trust: 0.8

db:CNNVDid:CNNVD-200807-350

Trust: 0.7

db:XFid:3

Trust: 0.6

db:XFid:43860

Trust: 0.6

db:MILW0RMid:6091

Trust: 0.6

db:SEEBUGid:SSVID-65601

Trust: 0.1

db:VULHUBid:VHN-33370

Trust: 0.1

db:PACKETSTORMid:68326

Trust: 0.1

sources: VULHUB: VHN-33370 // BID: 30271 // JVNDB: JVNDB-2008-003269 // PACKETSTORM: 68326 // CNNVD: CNNVD-200807-350 // NVD: CVE-2008-3245

REFERENCES

url:http://www.securityfocus.com/bid/30271

Trust: 1.7

url:http://secunia.com/advisories/31130

Trust: 1.7

url:https://www.exploit-db.com/exploits/6091

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/43860

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3245

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-3245

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/43860

Trust: 0.6

url:http://www.milw0rm.com/exploits/6091

Trust: 0.6

url:http://cable-modems.org/phphoo/

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/hardcore_disassembler_and_reverse_engineer/

Trust: 0.1

url:http://milw0rm.com/exploits/6091

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/secunia_security_specialist/

Trust: 0.1

url:http://secunia.com/product/19341/

Trust: 0.1

url:http://corporate.secunia.com/about_secunia/64/

Trust: 0.1

url:http://secunia.com/advisories/31130/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-33370 // BID: 30271 // JVNDB: JVNDB-2008-003269 // PACKETSTORM: 68326 // CNNVD: CNNVD-200807-350 // NVD: CVE-2008-3245

CREDITS

Mr.SQL

Trust: 0.9

sources: BID: 30271 // CNNVD: CNNVD-200807-350

SOURCES

db:VULHUBid:VHN-33370
db:BIDid:30271
db:JVNDBid:JVNDB-2008-003269
db:PACKETSTORMid:68326
db:CNNVDid:CNNVD-200807-350
db:NVDid:CVE-2008-3245

LAST UPDATE DATE

2025-04-10T21:06:51.241000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-33370date:2017-09-29T00:00:00
db:BIDid:30271date:2015-05-07T17:27:00
db:JVNDBid:JVNDB-2008-003269date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200807-350date:2008-09-11T00:00:00
db:NVDid:CVE-2008-3245date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-33370date:2008-07-21T00:00:00
db:BIDid:30271date:2008-07-17T00:00:00
db:JVNDBid:JVNDB-2008-003269date:2012-06-26T00:00:00
db:PACKETSTORMid:68326date:2008-07-18T20:56:39
db:CNNVDid:CNNVD-200807-350date:2008-07-21T00:00:00
db:NVDid:CVE-2008-3245date:2008-07-21T16:41:00