Paid To Read Script 2.0.5 has SQL Injection via the admin/userview.php uid parameter, the admin/viewemcamp.php fnum parameter, or the admin/viewvisitcamp.php fn parameter.
References
Link | Resource |
---|---|
https://packetstormsecurity.com/files/145439/Paid-To-Read-Script-2.0.5-SQL-Injection.html | Exploit Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/43334/ | Exploit Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Information
Published : 2017-12-18 01:29
Updated : 2018-01-02 07:30
NVD link : CVE-2017-17651
Mitre link : CVE-2017-17651
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
paid_to_read_script_project
- paid_to_read_script