SQL injection vulnerability in Invision Power Board (IPB) 2.0.3 and earlier allows remote attackers to execute arbitrary SQL commands via a crafted cookie password hash (pass_hash) that modifies the internal $pid variable.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Invision_board | Invision_power_services | 1.0 (including) | 1.0 (including) |
Invision_board | Invision_power_services | 1.0.1 (including) | 1.0.1 (including) |
Invision_board | Invision_power_services | 1.1.1 (including) | 1.1.1 (including) |
Invision_board | Invision_power_services | 1.1.2 (including) | 1.1.2 (including) |
Invision_board | Invision_power_services | 1.2 (including) | 1.2 (including) |
Invision_board | Invision_power_services | 1.3 (including) | 1.3 (including) |
Invision_board | Invision_power_services | 2.0_alpha_3 (including) | 2.0_alpha_3 (including) |
Invision_board | Invision_power_services | 2.0_pdr3 (including) | 2.0_pdr3 (including) |
Invision_power_board | Invision_power_services | 2.0.3 (including) | 2.0.3 (including) |