admin\db\DoSql.php in EmpireCMS through 7.5 allows remote attackers to execute arbitrary PHP code via SQL injection that uses a .php filename in a SELECT INTO OUTFILE statement to admin/admin.php.
References
Link | Resource |
---|---|
https://github.com/novysodope/empireCMS7.5 | Exploit Third Party Advisory |
http://i.3001.net/uploads/Up_imgs/20181118-ca3d385ac6cf2d231da185b4bb844bad.png!small | Exploit Third Party Advisory |
http://i.3001.net/uploads/Up_imgs/20181118-87192261fa34cad723bc7d8b8ca2cd17.png | Exploit Third Party Advisory |
http://i.3001.net/uploads/Up_imgs/20181118-2c996e3b89d19c9c9e6761ef67fd6d5c.png!small | Exploit Third Party Advisory |
Configurations
Information
Published : 2019-06-07 10:29
Updated : 2020-08-24 10:37
NVD link : CVE-2018-19462
Mitre link : CVE-2018-19462
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
phome
- empirecms