Описание
SQL injection vulnerability in blog/edit.php in Moodle 1.6.1 and earlier allows remote attackers to execute arbitrary SQL commands via the format parameter as stored in the $blogEntry variable, which is not properly handled by the insert_record function, which calls _adodb_column_sql in the adodb layer (lib/adodb/adodb-lib.inc.php), which does not convert the data type to an int.
Ссылки
- Vendor Advisory
 - PatchThird Party Advisory
 - Third Party AdvisoryVDB Entry
 - Third Party Advisory
 - Third Party Advisory
 - PatchThird Party AdvisoryVDB Entry
 - PatchThird Party AdvisoryVDB Entry
 - Third Party Advisory
 - Third Party AdvisoryVDB Entry
 - Third Party AdvisoryVDB Entry
 - Vendor Advisory
 - PatchThird Party Advisory
 - Third Party AdvisoryVDB Entry
 - Third Party Advisory
 - Third Party Advisory
 - PatchThird Party AdvisoryVDB Entry
 - PatchThird Party AdvisoryVDB Entry
 - Third Party Advisory
 
Уязвимые конфигурации
EPSS
7.5 High
CVSS2
Дефекты
Связанные уязвимости
SQL injection vulnerability in blog/edit.php in Moodle 1.6.1 and earlier allows remote attackers to execute arbitrary SQL commands via the format parameter as stored in the $blogEntry variable, which is not properly handled by the insert_record function, which calls _adodb_column_sql in the adodb layer (lib/adodb/adodb-lib.inc.php), which does not convert the data type to an int.
SQL injection vulnerability in blog/edit.php in Moodle 1.6.1 and earli ...
SQL injection vulnerability in blog/edit.php in Moodle 1.6.1 and earlier allows remote attackers to execute arbitrary SQL commands via the format parameter as stored in the $blogEntry variable, which is not properly handled by the insert_record function, which calls _adodb_column_sql in the adodb layer (lib/adodb/adodb-lib.inc.php), which does not convert the data type to an int.
EPSS
7.5 High
CVSS2