Multiple SQL injection vulnerabilities in Muviko 1.1 allow remote attackers to execute arbitrary SQL commands via the (1) email parameter to login.php; the (2) season_id parameter to themes/flixer/ajax/load_season.php; the (3) movie_id parameter to themes/flixer/ajax/get_rating.php; the (4) rating or (5) movie_id parameter to themes/flixer/ajax/update_rating.php; or the (6) id parameter to themes/flixer/ajax/set_player_source.php.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/145834/Muviko-1.1-SQL-Injection.html | Exploit Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/43477/ | Exploit Third Party Advisory VDB Entry |
Configurations
Information
Published : 2018-01-12 09:29
Updated : 2018-01-31 10:09
NVD link : CVE-2017-17970
Mitre link : CVE-2017-17970
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
muvikoscript
- muviko