CVE-2008-2446
Web Group Communication Center < 1.0.3_prerelease1 - Authenticated SQL Injection via Multiple Parameters
Title source: llmExploitation Summary
EIP tracks 1 public exploit for CVE-2008-2446. PoCs published by myvx.
AI-analyzed exploit summary This exploit demonstrates XSS and SQL injection vulnerabilities in Web Group Communication Center. The XSS payload bypasses filters via URL encoding, while the SQLi extracts user credentials from the database.
Description
Multiple SQL injection vulnerabilities in Web Group Communication Center (WGCC) 1.0.3 PreRelease 1 and earlier allow remote authenticated users to execute arbitrary SQL commands via the (1) userid parameter to (a) profile.php in a "show moreinfo" action; the (2) bildid parameter to (b) picturegallery.php in a shownext action; the (3) id parameter to (c) filebase.php in a freigeben action, (d) schedule.php in a del action, and (e) profile.php in an observe action; and the (4) pmid parameter in a delete action and (5) folderid parameter in a showfolder action to (f) message.php.
Exploits (1)
This exploit demonstrates XSS and SQL injection vulnerabilities in Web Group Communication Center. The XSS payload bypasses filters via URL encoding, while the SQLi extracts user credentials from the database.