payment_manage.ajax.php and various *_manage.ajax.php in MFScripts YetiShare 3.5.2 through 4.5.4 directly insert values from the sSortDir_0 parameter into a SQL string. This allows an attacker to inject their own SQL and manipulate the query, typically extracting data from the database, aka SQL Injection. NOTE: this issue exists because of an incomplete fix for CVE-2019-19732.
References
Link | Resource |
---|---|
https://yetishare.com/ | Product |
https://medium.com/@jra8908/yetishare-3-5-2-4-5-4-multiple-vulnerabilities-927d17b71ad | Exploit Third Party Advisory |
https://github.com/jra89/CVE-2019-20059 | Exploit Third Party Advisory |
https://mfscripts.com/ | Product |
Configurations
Information
Published : 2020-02-10 05:15
Updated : 2020-02-10 17:13
NVD link : CVE-2019-20059
Mitre link : CVE-2019-20059
JSON object : View
CWE
Products Affected
mfscripts
- yetishare