Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rmxc-vhg5-px7x

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

webTareas version 2.4 and earlier allows an unauthenticated user to perform Time and Boolean-based blind SQL Injection on the endpoint /includes/library.php, via the sor_cible, sor_champs, and sor_ordre HTTP POST parameters. This allows an attacker to access all the data in the database and obtain access to the webTareas application.

webTareas version 2.4 and earlier allows an unauthenticated user to perform Time and Boolean-based blind SQL Injection on the endpoint /includes/library.php, via the sor_cible, sor_champs, and sor_ordre HTTP POST parameters. This allows an attacker to access all the data in the database and obtain access to the webTareas application.

EPSS

Процентиль: 85%
0.02592
Низкий

Дефекты

CWE-89

Связанные уязвимости

CVSS3: 7.5
nvd
больше 4 лет назад

webTareas version 2.4 and earlier allows an unauthenticated user to perform Time and Boolean-based blind SQL Injection on the endpoint /includes/library.php, via the sor_cible, sor_champs, and sor_ordre HTTP POST parameters. This allows an attacker to access all the data in the database and obtain access to the webTareas application.

EPSS

Процентиль: 85%
0.02592
Низкий

Дефекты

CWE-89