HTTP: WordCircle Password Parameter SQL Injection

This signature detects attempts to exploit a known vulnerability in WordCircle. It is due to insufficient validation of user-supplied input. An attacker can exploit this issue by manipulating the SQL query logic to carry out unauthorized actions on the underlying database.

Extended Description

Wordcircle is prone to multiple input validation vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input. Multiple SQL injection and HTML injection vulnerabilities affect the application. Successful exploitation of these vulnerabilities could result in a compromise of the application, disclosure or modification of data, the theft of cookie-based authentication credentials. They may also permit an attacker to exploit vulnerabilities in the underlying database implementation as well as other attacks.

Affected Products

Wordcircle wordcircle

References

BugTraq: 16227

CVE: CVE-2006-0205

Short Name
HTTP:SQL:INJ:WORD-CIRCLE-SQL
Severity
Minor
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
CVE-2006-0205 Injection Parameter Password SQL WordCircle bid:16227
Release Date
05/06/2013
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Wordcircle

CVSS Score

5.1

Found a potential security threat?