CVSS VectorNVD
AV:N/AC:L/Au:N/C:P/I:P/A:P
Lifecycle Timeline
3DescriptionNVD
Multiple SQL injection vulnerabilities in Abarcar Realty Portal allow remote attackers to execute arbitrary SQL commands via the (1) neid parameter to newsdetails.php, or the (2) slid parameter to slistl.php. NOTE: the cat vector is already covered by CVE-2006-2853. NOTE: the vendor has notified CVE that the current version only creates static pages, and that slistl.php/slid never existed in any version
AnalysisAI
SQL injection vulnerability affecting Abarcar Realty Portal versions 5.1.5 and 6.0.1, allowing unauthenticated remote attackers to execute arbitrary SQL commands via the 'neid' parameter in newsdetails.php. With a publicly available proof-of-concept exploit and a high EPSS score of 2.69% (86th percentile), this vulnerability poses significant risk despite vendor claims that slistl.php/slid never existed and current versions only generate static pages.
Technical ContextAI
This is a classic SQL injection vulnerability (CWE-89) in PHP-based real estate portal software. The affected products are cpe:2.3:a:abarcar:abarcar_realty_portal:5.1.5 and cpe:2.3:a:abarcar:abarcar_realty_portal:6.0.1. The vulnerability occurs when user-supplied input in the 'neid' parameter to newsdetails.php is not properly sanitized before being used in SQL queries, allowing attackers to inject malicious SQL commands. The vendor disputes part of the vulnerability report, stating that slistl.php/slid never existed in any version.
RemediationAI
No specific patch information is available in the provided references. The vendor's statement about current versions using only static pages suggests upgrading to the latest version may mitigate the risk. As immediate mitigation: 1) Implement input validation and parameterized queries for any dynamic components, 2) Apply web application firewall rules to filter SQL injection attempts, 3) Consider migrating to the vendor's static page generation model if available. Review Secunia advisory 22792 and vendor communications for updates.
Share
External POC / Exploit Code
Leaving vuln.today