CVE-2008-2972

KbLance - SQL Injection via cat_id Parameter

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2008-2972. PoCs published by S.L TEAM.

AI-analyzed exploit summary This exploit demonstrates a SQL injection vulnerability in Knowledge Base Software Overview via the 'cat_id' parameter. It allows an attacker to extract sensitive information such as usernames and passwords from the database.

Description

SQL injection vulnerability in index.php in KbLance allows remote attackers to execute arbitrary SQL commands via the cat_id parameter in a comment action.

Exploits (1)

exploitdb WORKING POC VERIFIED
by S.L TEAM · textwebappsphp
https://www.exploit-db.com/exploits/5883

This exploit demonstrates a SQL injection vulnerability in Knowledge Base Software Overview via the 'cat_id' parameter. It allows an attacker to extract sensitive information such as usernames and passwords from the database.

Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target: Knowledge Base Software Overview
No auth needed
Prerequisites: Access to the vulnerable web application
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (4)

Core 4
Core References
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/5883
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/31123
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/43272
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/29859

Scores

EPSS 0.0049
EPSS Percentile 65.5%

Details

CWE
CWE-89
Status published
Products (1)
kblance/kblance _nil_
Published Jul 02, 2008
Tracked Since Feb 18, 2026