Описание
A SQL injection vulnerability in azurWebEngine in Sita AzurCMS through 1.2.3.12 allows an authenticated attacker to execute arbitrary SQL commands via the id parameter to mesdocs.ajax.php in azurWebEngine/eShop. By default, the query is executed as DBA.
Ссылки
- Product
- ExploitThird Party Advisory
- Vendor Advisory
- ProductVendor Advisory
- Product
- ExploitThird Party Advisory
- Vendor Advisory
- ProductVendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.2.3.12 (включая)
cpe:2.3:a:sitasoftware:azurcms:*:*:*:*:*:*:*:*
EPSS
Процентиль: 64%
0.00473
Низкий
8.8 High
CVSS3
6.5 Medium
CVSS2
Дефекты
CWE-89
Связанные уязвимости
github
больше 3 лет назад
A SQL injection vulnerability in azurWebEngine in Sita AzurCMS through 1.2.3.12 allows an authenticated attacker to execute arbitrary SQL commands via the id parameter to mesdocs.ajax.php in azurWebEngine/eShop. By default, the query is executed as DBA.
EPSS
Процентиль: 64%
0.00473
Низкий
8.8 High
CVSS3
6.5 Medium
CVSS2
Дефекты
CWE-89