Multiple SQL injection vulnerabilities in the ajax_checklist_save function in the Ajax Checklist module 5.x before 5.x-1.1 for Drupal allow remote authenticated users, with "update ajax checklists" permissions, to execute arbitrary SQL commands via a save operation, related to the (1) nid, (2) qid, and (3) state parameters.
References
Link | Resource |
---|---|
http://drupal.org/node/312968 | Patch Vendor Advisory |
http://www.securityfocus.com/bid/31384 | Exploit Patch |
http://secunia.com/advisories/32009 | Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/45410 | |
http://www.securityfocus.com/archive/1/496727/100/0/threaded |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2009-01-28 07:30
Updated : 2018-10-11 13:56
NVD link : CVE-2008-5998
Mitre link : CVE-2008-5998
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
drupal
- drupal
- ajax_checklist