Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-pr2c-m553-hpcv

Опубликовано: 12 дек. 2024
Источник: github
Github: Не прошло ревью
CVSS3: 4.4

Описание

An authenticated attacker with the user/role "Poweruser" can perform an SQL injection by accessing the /class/template_io.php file and supplying malicious GET parameters. The "templates" parameter is vulnerable against blind boolean-based SQL injection attacks. SQL syntax must be injected into the JSON syntax of the templates parameter.

An authenticated attacker with the user/role "Poweruser" can perform an SQL injection by accessing the /class/template_io.php file and supplying malicious GET parameters. The "templates" parameter is vulnerable against blind boolean-based SQL injection attacks. SQL syntax must be injected into the JSON syntax of the templates parameter.

EPSS

Процентиль: 13%
0.00042
Низкий

4.4 Medium

CVSS3

Дефекты

CWE-89

Связанные уязвимости

CVSS3: 4.4
nvd
около 1 года назад

An authenticated attacker with the user/role "Poweruser" can perform an SQL injection by accessing the /class/template_io.php file and supplying malicious GET parameters. The "templates" parameter is vulnerable against blind boolean-based SQL injection attacks. SQL syntax must be injected into the JSON syntax of the templates parameter.

EPSS

Процентиль: 13%
0.00042
Низкий

4.4 Medium

CVSS3

Дефекты

CWE-89