Description
SQL injection vulnerability in auth.php in ScozNet ScozBook BETA 1.1 allows remote attackers to execute arbitrary SQL commands via the username field (adminname variable).
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Aliaksandr Hartsuyeu · textwebappsphp
https://www.exploit-db.com/exploits/27018
References (7)
Core 7
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/22221
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/8476
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/16115
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2006/0027
Various Sources x_refsource_misc
http://evuln.com/vulns/11/summary.html
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/420675/100/0/threaded
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/318
Scores
EPSS
0.0086
EPSS Percentile
75.1%
Details
Status
published
Products (1)
scoznet/scozbook
1.1_beta
Published
Jan 04, 2006
Tracked Since
Feb 18, 2026