Description
SQL injection vulnerability in functions/functions_filters.asp in Web Wiz Forums before 8.05a (MySQL version) does not properly filter certain characters in SQL commands, which allows remote attackers to execute arbitrary SQL commands via \"' (backslash double-quote quote) sequences, which are collapsed into \'', as demonstrated via the name parameter to forum/pop_up_member_search.asp.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Ivan Fratric · textwebappsphp
https://www.exploit-db.com/exploits/29762
References (9)
Core 9
Core References
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/23051
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/24561
Vendor Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2007/1061
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/33095
Various Sources x_refsource_confirm
http://www.webwizguide.info/web_wiz_forums/Version%20History.txt
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/463287/100/0/threaded
Exploit third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/2456
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/34344
Exploit x_refsource_misc
http://ifsec.blogspot.com/2007/03/web-wiz-forums-805-mysql-version-sql.html
Scores
EPSS
0.0183
EPSS Percentile
83.0%
Details
CWE
CWE-89
Status
published
Products (40)
webwizguide/web_wiz_forums
5.21
webwizguide/web_wiz_forums
5.22
webwizguide/web_wiz_forums
6 beta_1 (6 CPE variants)
webwizguide/web_wiz_forums
6.0
webwizguide/web_wiz_forums
6.10
webwizguide/web_wiz_forums
6.11
webwizguide/web_wiz_forums
6.12
webwizguide/web_wiz_forums
6.20
webwizguide/web_wiz_forums
6.21
webwizguide/web_wiz_forums
6.22
... and 30 more
Published
Mar 20, 2007
Tracked Since
Feb 18, 2026