FKIE_CVE-2006-1278

Vulnerability from fkie_nvd - Published: 2006-03-19 11:06 - Updated: 2026-04-16 00:27
Severity ?
Summary
SQL injection vulnerability in @1 File Store 2006.03.07 allows remote attackers to execute arbitrary SQL commands via the id parameter to (1) functions.php and (2) user.php in the libs directory, (3) edit.php and (4) delete.php in control/files/, (5) edit.php and (6) delete.php in control/users/, (7) edit.php, (8) access.php, and (9) in control/folders/, (10) access.php and (11) delete.php in control/groups/, (12) confirm.php, and (13) download.php; (14) the email parameter in password.php, and (15) the id parameter in folder.php. NOTE: it was later reported that vectors 12 and 13 also affect @1 File Store PRO 3.2.
References
cve@mitre.orghttp://evuln.com/vulns/95/summary.htmlExploit
cve@mitre.orghttp://osvdb.org/47017
cve@mitre.orghttp://osvdb.org/47018
cve@mitre.orghttp://secunia.com/advisories/19224Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/31063Vendor Advisory
cve@mitre.orghttp://securityreason.com/securityalert/619Exploit
cve@mitre.orghttp://securitytracker.com/id?1015826Exploit
cve@mitre.orghttp://www.attrition.org/pipermail/vim/2009-August/002246.html
cve@mitre.orghttp://www.osvdb.org/23851Exploit
cve@mitre.orghttp://www.osvdb.org/23852
cve@mitre.orghttp://www.osvdb.org/23853
cve@mitre.orghttp://www.osvdb.org/23854
cve@mitre.orghttp://www.osvdb.org/23855
cve@mitre.orghttp://www.osvdb.org/23856
cve@mitre.orghttp://www.osvdb.org/23857
cve@mitre.orghttp://www.osvdb.org/23858
cve@mitre.orghttp://www.osvdb.org/23859
cve@mitre.orghttp://www.osvdb.org/23860
cve@mitre.orghttp://www.osvdb.org/23861
cve@mitre.orghttp://www.osvdb.org/23862
cve@mitre.orghttp://www.osvdb.org/23863
cve@mitre.orghttp://www.osvdb.org/23864
cve@mitre.orghttp://www.osvdb.org/24106
cve@mitre.orghttp://www.securityfocus.com/archive/1/428659/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/17090
cve@mitre.orghttp://www.securityfocus.com/bid/30182Exploit
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/0943Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/25183
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/43718
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/43724
cve@mitre.orghttps://www.exploit-db.com/exploits/6040
af854a3a-2127-422b-91ae-364da2661108http://evuln.com/vulns/95/summary.htmlExploit
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/47017
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/47018
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19224Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31063Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/619Exploit
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1015826Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.attrition.org/pipermail/vim/2009-August/002246.html
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/23851Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/23852
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/23853
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/23854
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/23855
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/23856
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/23857
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/23858
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/23859
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/23860
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/23861
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/23862
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/23863
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/23864
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/24106
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/428659/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/17090
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/30182Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/0943Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/25183
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/43718
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/43724
af854a3a-2127-422b-91ae-364da2661108https://www.exploit-db.com/exploits/6040
Impacted products
Vendor Product Version
upoint \@1_file_store 2006.03.07

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:upoint:\\@1_file_store:2006.03.07:*:*:*:*:*:*:*",
              "matchCriteriaId": "C20CC9D0-7695-42A4-90C2-E1D5BC8B4FC0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SQL injection vulnerability in @1 File Store 2006.03.07 allows remote attackers to execute arbitrary SQL commands via the id parameter to (1) functions.php and (2) user.php in the libs directory, (3) edit.php and (4) delete.php in control/files/, (5) edit.php and (6) delete.php in control/users/, (7) edit.php, (8) access.php, and (9) in control/folders/, (10) access.php and (11) delete.php in control/groups/, (12) confirm.php, and (13) download.php; (14) the email parameter in password.php, and (15) the id parameter in folder.php.  NOTE: it was later reported that vectors 12 and 13 also affect @1 File Store PRO 3.2."
    }
  ],
  "evaluatorSolution": "Successful exploitation requires that the \"magic_quotes_gpc\" parameter is disabled.",
  "id": "CVE-2006-1278",
  "lastModified": "2026-04-16T00:27:16.627",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-03-19T11:06:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://evuln.com/vulns/95/summary.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/47017"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/47018"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19224"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31063"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://securityreason.com/securityalert/619"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://securitytracker.com/id?1015826"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.attrition.org/pipermail/vim/2009-August/002246.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.osvdb.org/23851"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/23852"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/23853"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/23854"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/23855"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/23856"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/23857"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/23858"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/23859"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/23860"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/23861"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/23862"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/23863"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/23864"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/24106"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/428659/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/17090"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/30182"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/0943"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25183"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43718"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43724"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.exploit-db.com/exploits/6040"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://evuln.com/vulns/95/summary.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/47017"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/47018"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19224"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31063"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://securityreason.com/securityalert/619"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://securitytracker.com/id?1015826"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.attrition.org/pipermail/vim/2009-August/002246.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.osvdb.org/23851"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/23852"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/23853"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/23854"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/23855"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/23856"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/23857"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/23858"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/23859"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/23860"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/23861"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/23862"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/23863"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/23864"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/24106"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/428659/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/17090"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/30182"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/0943"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25183"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43718"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43724"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.exploit-db.com/exploits/6040"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…