Description
SQL injection vulnerability in lib/entry_reply_entry.php in Invision Community Blog Mod 1.2.4 allows remote attackers to execute arbitrary SQL commands via the eid parameter, when accessed through the "Preview message" functionality.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by anonymous · textwebappsphp
https://www.exploit-db.com/exploits/2877
References (4)
Core 4
Core References
Patch x_refsource_confirm
http://forums.invisionpower.com/index.php?showtopic=230108
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/453159/100/100/threaded
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2006/4820
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/453126/100/100/threaded
Scores
EPSS
0.0028
EPSS Percentile
51.5%
Details
Status
published
Products (1)
invision_power_services/invision_community_blog
1.2.4
Published
Dec 07, 2006
Tracked Since
Feb 18, 2026