FKIE_CVE-2007-4808

Vulnerability from fkie_nvd - Published: 2007-09-11 18:17 - Updated: 2026-04-23 00:35
Severity ?
Summary
Multiple SQL injection vulnerabilities in TLM CMS 3.2 allow remote attackers to execute arbitrary SQL commands via (1) the id parameter to news.php in a lirenews action, (2) the idnews parameter to goodies.php in a lire action, (3) the id parameter to file.php in a voir action, (4) the ID parameter to affichage.php, (5) the id_sal parameter to mod_forum/afficher.php, or (6) the id_sujet parameter to mod_forum/messages.php. NOTE: it was later reported that goodies.php and affichage.php scripts are reachable through index.php, and 1.1 is also affected. NOTE: it was later reported that the goodies.php vector also affects 3.1.
References
cve@mitre.orghttp://osvdb.org/37001
cve@mitre.orghttp://osvdb.org/37002
cve@mitre.orghttp://osvdb.org/37003
cve@mitre.orghttp://osvdb.org/37004
cve@mitre.orghttp://osvdb.org/37005
cve@mitre.orghttp://osvdb.org/37006
cve@mitre.orghttp://secunia.com/advisories/26752Vendor Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/25602Exploit
cve@mitre.orghttp://www.securityfocus.com/bid/29049
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/3137Vendor Advisory
cve@mitre.orghttp://www.z0rlu.ownspace.org/index.php?/archives/74-Powered-by-TLM-CMS-index.php-sql-inj..html
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/36536
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/42204
cve@mitre.orghttps://www.exploit-db.com/exploits/4376
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/37001
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/37002
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/37003
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/37004
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/37005
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/37006
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26752Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/25602Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/29049
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/3137Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.z0rlu.ownspace.org/index.php?/archives/74-Powered-by-TLM-CMS-index.php-sql-inj..html
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/36536
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/42204
af854a3a-2127-422b-91ae-364da2661108https://www.exploit-db.com/exploits/4376
Impacted products
Vendor Product Version
tlm_cms tlm_cms 1.1
tlm_cms tlm_cms 3.2

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:tlm_cms:tlm_cms:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "83FF3F9F-4E5A-47EB-80B5-C8A59A57D93C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tlm_cms:tlm_cms:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "384EF97C-6D55-475F-BB57-2625B8C2BCBB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple SQL injection vulnerabilities in TLM CMS 3.2 allow remote attackers to execute arbitrary SQL commands via (1) the id parameter to news.php in a lirenews action, (2) the idnews parameter to goodies.php in a lire action, (3) the id parameter to file.php in a voir action, (4) the ID parameter to affichage.php, (5) the id_sal parameter to mod_forum/afficher.php, or (6) the id_sujet parameter to mod_forum/messages.php.  NOTE: it was later reported that goodies.php and affichage.php scripts are reachable through index.php, and 1.1 is also affected.  NOTE: it was later reported that the goodies.php vector also affects 3.1."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades de inyecci\u00f3n SQL en TLM CMS versi\u00f3n 3.2, permiten a atacantes remotos ejecutar comandos SQL arbitrarios por medio de (1) el par\u00e1metro id en el archivo news.php en una acci\u00f3n lirenews, (2) el par\u00e1metro idnews en el archivo goodies.php en una acci\u00f3n lire, (3) el par\u00e1metro id en el archivo file.php en una acci\u00f3n voir, (4) el par\u00e1metro ID en el archivo affichage.php, (5) el par\u00e1metro id_sal en el archivo mod_forum/afficher.php, o (6) el par\u00e1metro id_sujet en el archivo mod_forum/messages.php . NOTA: m\u00e1s tarde se report\u00f3 que los scripts goodies.php y affichage.php son accesibles por medio del archivo index.php, y la versi\u00f3n 1.1 tambi\u00e9n est\u00e1 afectada. NOTA: m\u00e1s tarde se report\u00f3 que el vector goodies.php tambi\u00e9n afecta la versi\u00f3n 3.1."
    }
  ],
  "id": "CVE-2007-4808",
  "lastModified": "2026-04-23T00:35:47.467",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-09-11T18:17:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/37001"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/37002"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/37003"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/37004"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/37005"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/37006"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26752"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/25602"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/29049"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/3137"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.z0rlu.ownspace.org/index.php?/archives/74-Powered-by-TLM-CMS-index.php-sql-inj..html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36536"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42204"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.exploit-db.com/exploits/4376"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/37001"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/37002"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/37003"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/37004"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/37005"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/37006"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26752"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/25602"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/29049"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/3137"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.z0rlu.ownspace.org/index.php?/archives/74-Powered-by-TLM-CMS-index.php-sql-inj..html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36536"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42204"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.exploit-db.com/exploits/4376"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…