Summary
BaconMap is prone to a local file-include vulnerability and an SQL- injection vulnerability because it fails to properly sanitize user- supplied input.
An attacker can exploit the local file-include vulnerability using directory- traversal strings to view and execute arbitrary local files within the context of the webserver process. Information harvested may aid in further attacks.
The attacker can exploit the SQL-injection vulnerability to compromise the application, access or modify data, exploit latent vulnerabilities in the underlying database, or bypass the authentication control.
BaconMap 1.0 is vulnerable
other versions may also be affected.
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2010-4800, CVE-2010-4801 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- Atutor AChecker Multiple SQL Injection and XSS Vulnerabilities
- Ad Manager Pro Multiple SQL Injection And XSS Vulnerabilities
- 68designs 68kb Multiple Remote File Include Vulnerabilities
- ArticleSetup Multiple Cross-Site Scripting and SQL Injection Vulnerabilities
- ArticleFR CMS 'id' Parameter SQL Injection Vulnerability