PHP-Fusion 9.03.50 allows SQL Injection because maincore.php has an insufficient protection mechanism. An attacker can develop a crafted payload that can be inserted into the sort_order GET parameter on the members.php members search page. This parameter allows for control over anything after the ORDER BY clause in the SQL query.
References
Link | Resource |
---|---|
https://github.com/php-fusion/PHP-Fusion/commit/79fe5ec1d5c75e017a6f42127741b9543658f822 | Patch Third Party Advisory |
https://github.com/php-fusion/PHP-Fusion/commit/858e43d7b0ea1897f76d5bcb3a1aed438132c0e2 | Patch Third Party Advisory |
https://hackmd.io/lq7nA3ISSoeiGjiHVn5CoA | Exploit Third Party Advisory |
https://github.com/php-fusion/PHP-Fusion/commit/d95cd4a2d22487723266c898b98e6be10754e03d | Patch Third Party Advisory |
https://github.com/php-fusion/PHP-Fusion/issues/2308 | Exploit Third Party Advisory |
Configurations
Information
Published : 2020-04-29 10:15
Updated : 2020-05-05 08:28
NVD link : CVE-2020-12461
Mitre link : CVE-2020-12461
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
php-fusion
- php-fusion