Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jg6w-g8mj-cg8m

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The filter function in php/src/include.php in Simple Management for BIND (aka smbind) before 0.4.8 does not anchor a certain regular expression, which allows remote attackers to conduct SQL injection attacks and execute arbitrary SQL commands via the username parameter to the admin login page.

The filter function in php/src/include.php in Simple Management for BIND (aka smbind) before 0.4.8 does not anchor a certain regular expression, which allows remote attackers to conduct SQL injection attacks and execute arbitrary SQL commands via the username parameter to the admin login page.

EPSS

Процентиль: 63%
0.00444
Низкий

Дефекты

CWE-89

Связанные уязвимости

ubuntu
около 15 лет назад

The filter function in php/src/include.php in Simple Management for BIND (aka smbind) before 0.4.8 does not anchor a certain regular expression, which allows remote attackers to conduct SQL injection attacks and execute arbitrary SQL commands via the username parameter to the admin login page.

nvd
около 15 лет назад

The filter function in php/src/include.php in Simple Management for BIND (aka smbind) before 0.4.8 does not anchor a certain regular expression, which allows remote attackers to conduct SQL injection attacks and execute arbitrary SQL commands via the username parameter to the admin login page.

debian
около 15 лет назад

The filter function in php/src/include.php in Simple Management for BI ...

EPSS

Процентиль: 63%
0.00444
Низкий

Дефекты

CWE-89