SQL Injection was discovered in Admidio before version 3.3.13. The main cookie parameter is concatenated into a SQL query without any input validation/sanitization, thus an attacker without logging in, can send a GET request with arbitrary SQL queries appended to the cookie parameter and execute SQL queries. The vulnerability impacts the confidentiality of the system. This has been patched in version 3.3.13.
References
Link | Resource |
---|---|
https://github.com/Admidio/admidio/security/advisories/GHSA-qh57-rcff-gx54 | Third Party Advisory |
https://github.com/Admidio/admidio/issues/908 | Third Party Advisory |
https://github.com/Admidio/admidio/commit/ea5d6f114b151ed11ec0ad7cb47bd729e77a874a | Patch |
Configurations
Information
Published : 2020-04-24 14:15
Updated : 2020-05-01 12:25
NVD link : CVE-2020-11004
Mitre link : CVE-2020-11004
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
admidio
- admidio