SQL injection vulnerability in inc/lib/Control/Ajax/tags-ajax.control.php in GeniXCMS 0.0.8 allows remote authenticated editors to execute arbitrary SQL commands via the term parameter to the default URI.
References
Link | Resource |
---|---|
https://github.com/semplon/GeniXCMS/issues/60 | Exploit Issue Tracking Patch |
https://github.com/semplon/GeniXCMS/commit/6e21c01d87672d81080450e6913e0093a02bfab8 | Patch |
http://www.securityfocus.com/bid/95660 | Third Party Advisory VDB Entry |
Configurations
Information
Published : 2017-01-11 22:59
Updated : 2017-01-27 07:15
NVD link : CVE-2017-5345
Mitre link : CVE-2017-5345
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
metalgenix
- genixcms