Описание
SQL injection vulnerability in the brilliant_gallery_checklist_save function in the bgchecklist/save script in Brilliant Gallery 5.x and 6.x, a module for Drupal, allows remote authenticated users with "access brilliant_gallery" permissions to execute arbitrary SQL commands via the (1) nid, (2) qid, (3) state, and possibly (4) user parameters.
Ссылки
- Exploit
- Vendor Advisory
- Exploit
- Exploit
- Vendor Advisory
- Exploit
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:vacilanda:brilliant_gallery:*:*:*:*:*:*:*:*
cpe:2.3:a:vacilanda:brilliant_gallery:5:*:*:*:*:*:*:*
cpe:2.3:a:vacilanda:brilliant_gallery:6:*:*:*:*:*:*:*
EPSS
Процентиль: 64%
0.00461
Низкий
6 Medium
CVSS2
Дефекты
CWE-89
Связанные уязвимости
github
почти 4 года назад
SQL injection vulnerability in the brilliant_gallery_checklist_save function in the bgchecklist/save script in Brilliant Gallery 5.x and 6.x, a module for Drupal, allows remote authenticated users with "access brilliant_gallery" permissions to execute arbitrary SQL commands via the (1) nid, (2) qid, (3) state, and possibly (4) user parameters.
EPSS
Процентиль: 64%
0.00461
Низкий
6 Medium
CVSS2
Дефекты
CWE-89