Description
Multiple SQL injection vulnerabilities in PHP Address Book 4.0.x allow remote attackers to execute arbitrary SQL commands via the (1) id parameter to delete.php or (2) alphabet parameter to index.php. NOTE: the edit.php and view.php vectors are already covered by CVE-2008-2565.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by YEnH4ckEr · textwebappsphp
https://www.exploit-db.com/exploits/9023
References (4)
Core 4
Core References
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/35511
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/35590
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/504595/100/0/threaded
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/9023
Scores
EPSS
0.0032
EPSS Percentile
55.4%
Details
CWE
CWE-89
Status
published
Products (2)
chatelao/php_address_book
4.0.1
chatelao/php_address_book
4.0.2
Published
Jul 27, 2009
Tracked Since
Feb 18, 2026