CVE-2006-0759

high

Description

Multiple SQL injection vulnerabilities in HiveMail 1.3 and earlier allow remote attackers to execute arbitrary SQL commands via (1) the contactgroupid parameter in addressbook.update.php, (2) the messageid parameter in addressbook.add.php, (3) the folderid parameter in folders.update.php, and possibly certain parameters in (4) calendar.event.php, (5) index.php, (6) pop.download.php, (7) read.bounce.php, (8) rules.block.php, (9) language.php, and (10) certain other scripts; and allow remote authenticated users to execute arbitrary SQL commands via (11) the folderid parameter in index.php and (12) possibly other parameters in certain other scripts, because $_SERVER['PHP_SELF'] is improperly handled.

References

https://exchange.xforce.ibmcloud.com/vulnerabilities/24623

http://www.vupen.com/english/advisories/2006/0527

http://www.securityfocus.com/bid/16591

http://www.gulftech.org/?node=research&article_id=00098-02102006

http://securityreason.com/securityalert/422

http://secunia.com/advisories/18807

http://forum.hivemail.com/showthread.php?p=26745

http://archives.neohapsis.com/archives/bugtraq/2006-02/0162.html

Details

Source: Mitre, NVD

Published: 2006-02-18

Updated: 2026-04-16

Risk Information

CVSS v2

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Severity: High

CVSS v3

Base Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Severity: High

EPSS

EPSS: 0.03252