CVE-2006-5840

HIGH
2006-11-10 [email protected]
7.5
CVSS 2.0
Share

CVSS VectorNVD

AV:N/AC:L/Au:N/C:P/I:P/A:P
Attack Vector
Network
Attack Complexity
Low
Confidentiality
P
Integrity
P
Availability
P

Lifecycle Timeline

3
Analysis Generated
Mar 13, 2026 - 18:30 vuln.today
PoC Detected
Mar 13, 2026 - 17:25 vuln.today
Public exploit code
CVE Published
Nov 10, 2006 - 02:07 nvd
HIGH 7.5

DescriptionNVD

Multiple SQL injection vulnerabilities in Abarcar Realty Portal allow remote attackers to execute arbitrary SQL commands via the (1) neid parameter to newsdetails.php, or the (2) slid parameter to slistl.php. NOTE: the cat vector is already covered by CVE-2006-2853. NOTE: the vendor has notified CVE that the current version only creates static pages, and that slistl.php/slid never existed in any version

AnalysisAI

SQL injection vulnerability affecting Abarcar Realty Portal versions 5.1.5 and 6.0.1, allowing unauthenticated remote attackers to execute arbitrary SQL commands via the 'neid' parameter in newsdetails.php. With a publicly available proof-of-concept exploit and a high EPSS score of 2.69% (86th percentile), this vulnerability poses significant risk despite vendor claims that slistl.php/slid never existed and current versions only generate static pages.

Technical ContextAI

This is a classic SQL injection vulnerability (CWE-89) in PHP-based real estate portal software. The affected products are cpe:2.3:a:abarcar:abarcar_realty_portal:5.1.5 and cpe:2.3:a:abarcar:abarcar_realty_portal:6.0.1. The vulnerability occurs when user-supplied input in the 'neid' parameter to newsdetails.php is not properly sanitized before being used in SQL queries, allowing attackers to inject malicious SQL commands. The vendor disputes part of the vulnerability report, stating that slistl.php/slid never existed in any version.

RemediationAI

No specific patch information is available in the provided references. The vendor's statement about current versions using only static pages suggests upgrading to the latest version may mitigate the risk. As immediate mitigation: 1) Implement input validation and parameterized queries for any dynamic components, 2) Apply web application firewall rules to filter SQL injection attempts, 3) Consider migrating to the vendor's static page generation model if available. Review Secunia advisory 22792 and vendor communications for updates.

Share

CVE-2006-5840 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy