Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-326g-q2jr-r5fm

Опубликовано: 26 нояб. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 7.2
CVSS3: 6.5

Описание

PostgreSQL SQL Injection (status_sql.php) in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, 7000 allows an attacker to perform SQL injection via sw1 and sw2 parameters in status_sql.php. The status_sql.php endpoint constructs SQL UPDATE queries by directly concatenating user-controlled sw1 and sw2 parameters without using parameterized queries or pg_escape_string(). While PostgreSQL's pg_exec limitations prevent stacked queries, attackers can inject subqueries for data exfiltration and leverage verbose error messages for reconnaissance.

PostgreSQL SQL Injection (status_sql.php) in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, 7000 allows an attacker to perform SQL injection via sw1 and sw2 parameters in status_sql.php. The status_sql.php endpoint constructs SQL UPDATE queries by directly concatenating user-controlled sw1 and sw2 parameters without using parameterized queries or pg_escape_string(). While PostgreSQL's pg_exec limitations prevent stacked queries, attackers can inject subqueries for data exfiltration and leverage verbose error messages for reconnaissance.

EPSS

Процентиль: 11%
0.00039
Низкий

7.2 High

CVSS4

6.5 Medium

CVSS3

Дефекты

CWE-89

Связанные уязвимости

CVSS3: 6.5
nvd
2 месяца назад

PostgreSQL SQL Injection (status_sql.php) in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, 7000 allows an attacker to perform SQL injection via sw1 and sw2 parameters in status_sql.php. The `status_sql.php` endpoint constructs SQL UPDATE queries by directly concatenating user-controlled `sw1` and `sw2` parameters without using parameterized queries or `pg_escape_string()`. While PostgreSQL's `pg_exec` limitations prevent stacked queries, attackers can inject subqueries for data exfiltration and leverage verbose error messages for reconnaissance.

EPSS

Процентиль: 11%
0.00039
Низкий

7.2 High

CVSS4

6.5 Medium

CVSS3

Дефекты

CWE-89