Описание
SQL injection vulnerability in the brilliant_gallery_checklist_save function in the bgchecklist/save script in Brilliant Gallery 5.x and 6.x, a module for Drupal, allows remote authenticated users with "access brilliant_gallery" permissions to execute arbitrary SQL commands via the (1) nid, (2) qid, (3) state, and possibly (4) user parameters.
SQL injection vulnerability in the brilliant_gallery_checklist_save function in the bgchecklist/save script in Brilliant Gallery 5.x and 6.x, a module for Drupal, allows remote authenticated users with "access brilliant_gallery" permissions to execute arbitrary SQL commands via the (1) nid, (2) qid, (3) state, and possibly (4) user parameters.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2008-4338
- https://exchange.xforce.ibmcloud.com/vulnerabilities/45411
- http://drupal.org/node/313054
- http://lists.grok.org.uk/pipermail/full-disclosure/2008-September/064662.html
- http://secunia.com/advisories/32015
- http://securityreason.com/securityalert/4338
- http://www.securityfocus.com/archive/1/496726/100/0/threaded
- http://www.securityfocus.com/bid/31387
Связанные уязвимости
SQL injection vulnerability in the brilliant_gallery_checklist_save function in the bgchecklist/save script in Brilliant Gallery 5.x and 6.x, a module for Drupal, allows remote authenticated users with "access brilliant_gallery" permissions to execute arbitrary SQL commands via the (1) nid, (2) qid, (3) state, and possibly (4) user parameters.