Multiple SQL injection vulnerabilities in EllisLab ExpressionEngine before 2.9.1 allow remote authenticated users to execute arbitrary SQL commands via the (1) column_filter or (2) category[] parameter to system/index.php or the (3) tbl_sort[0][] parameter in the comment module to system/index.php.
References
Configurations
Configuration 1 (hide)
|
Information
Published : 2014-11-04 07:55
Updated : 2020-07-06 12:45
NVD link : CVE-2014-5387
Mitre link : CVE-2014-5387
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
expressionengine
- expressionengine
ellislab
- expressionengine