Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2c2c-mqw3-8m8q

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

translation_manage_text.ajax.php and various *_manage.ajax.php in MFScripts YetiShare 3.5.2 through 4.5.3 directly insert values from the aSortDir_0 and/or sSortDir_0 parameter into a SQL string. This allows an attacker to inject their own SQL and manipulate the query, typically extracting data from the database, aka SQL Injection.

translation_manage_text.ajax.php and various *_manage.ajax.php in MFScripts YetiShare 3.5.2 through 4.5.3 directly insert values from the aSortDir_0 and/or sSortDir_0 parameter into a SQL string. This allows an attacker to inject their own SQL and manipulate the query, typically extracting data from the database, aka SQL Injection.

EPSS

Процентиль: 55%
0.0032
Низкий

Связанные уязвимости

CVSS3: 7.2
nvd
около 6 лет назад

translation_manage_text.ajax.php and various *_manage.ajax.php in MFScripts YetiShare 3.5.2 through 4.5.3 directly insert values from the aSortDir_0 and/or sSortDir_0 parameter into a SQL string. This allows an attacker to inject their own SQL and manipulate the query, typically extracting data from the database, aka SQL Injection.

EPSS

Процентиль: 55%
0.0032
Низкий