SQL injection vulnerability in mod/poll/comment.php in the vote module in Danneo CMS 0.5.2 and earlier allows remote attackers to execute arbitrary SQL commands via the comtext parameter, in conjunction with crafted comname and comtitle parameters, in a poll action to index.php, related to incorrect input sanitization in base/danneo.function.php.
References
Link | Resource |
---|---|
http://secunia.com/advisories/36440 | Vendor Advisory |
http://www.vupen.com/english/advisories/2009/2459 | Vendor Advisory |
http://packetstormsecurity.org/0908-exploits/danneo052-sql.txt | Exploit |
Configurations
Configuration 1 (hide)
|
Information
Published : 2009-09-09 15:30
Updated : 2009-09-09 21:00
NVD link : CVE-2009-3118
Mitre link : CVE-2009-3118
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
danneo
- cms