Описание
Multiple SQL injection vulnerabilities in ClanSphere 2009.0.3 and earlier allow remote attackers to execute arbitrary SQL commands via (1) the IP address to the cs_getip function in generate.php in the Captcha module, or (2) the s_email parameter to the cs_sql_select function in the MySQL database driver (mysql.php).
Ссылки
- Exploit
- Exploit
- ExploitPatch
- ExploitPatch
- Exploit
- Exploit
- ExploitPatch
- ExploitPatch
Уязвимые конфигурации
Конфигурация 1Версия до 2009.0.3 (включая)
Одно из
cpe:2.3:a:csphere:clansphere:*:*:*:*:*:*:*:*
cpe:2.3:a:csphere:clansphere:2007:rc1:*:*:*:*:*:*
cpe:2.3:a:csphere:clansphere:2007:rc2:*:*:*:*:*:*
cpe:2.3:a:csphere:clansphere:2007:rc3:*:*:*:*:*:*
cpe:2.3:a:csphere:clansphere:2007.0:*:*:*:*:*:*:*
cpe:2.3:a:csphere:clansphere:2007.1:*:*:*:*:*:*:*
cpe:2.3:a:csphere:clansphere:2007.2:*:*:*:*:*:*:*
cpe:2.3:a:csphere:clansphere:2007.2.1:*:*:*:*:*:*:*
cpe:2.3:a:csphere:clansphere:2007.3:*:*:*:*:*:*:*
cpe:2.3:a:csphere:clansphere:2007.3.1:*:*:*:*:*:*:*
cpe:2.3:a:csphere:clansphere:2007.4:*:*:*:*:*:*:*
cpe:2.3:a:csphere:clansphere:2007.4.1:*:*:*:*:*:*:*
cpe:2.3:a:csphere:clansphere:2007.4.2:*:*:*:*:*:*:*
cpe:2.3:a:csphere:clansphere:2007.4.3:*:*:*:*:*:*:*
cpe:2.3:a:csphere:clansphere:2007.4.4:*:*:*:*:*:*:*
cpe:2.3:a:csphere:clansphere:2008.0:*:*:*:*:*:*:*
cpe:2.3:a:csphere:clansphere:2008.1:*:*:*:*:*:*:*
cpe:2.3:a:csphere:clansphere:2008.2:*:*:*:*:*:*:*
cpe:2.3:a:csphere:clansphere:2008.2.1:*:*:*:*:*:*:*
cpe:2.3:a:csphere:clansphere:2009.0:*:*:*:*:*:*:*
cpe:2.3:a:csphere:clansphere:2009.0:rc1:*:*:*:*:*:*
cpe:2.3:a:csphere:clansphere:2009.0:rc2:*:*:*:*:*:*
cpe:2.3:a:csphere:clansphere:2009.0:rc3:*:*:*:*:*:*
cpe:2.3:a:csphere:clansphere:2009.0.1:*:*:*:*:*:*:*
cpe:2.3:a:csphere:clansphere:2009.0.2:*:*:*:*:*:*:*
EPSS
Процентиль: 80%
0.01458
Низкий
7.5 High
CVSS2
Дефекты
CWE-89
Связанные уязвимости
github
больше 3 лет назад
Multiple SQL injection vulnerabilities in ClanSphere 2009.0.3 and earlier allow remote attackers to execute arbitrary SQL commands via (1) the IP address to the cs_getip function in generate.php in the Captcha module, or (2) the s_email parameter to the cs_sql_select function in the MySQL database driver (mysql.php).
EPSS
Процентиль: 80%
0.01458
Низкий
7.5 High
CVSS2
Дефекты
CWE-89