SQL injection vulnerability in the brilliant_gallery_checklist_save function in the bgchecklist/save script in Brilliant Gallery 5.x and 6.x, a module for Drupal, allows remote authenticated users with "access brilliant_gallery" permissions to execute arbitrary SQL commands via the (1) nid, (2) qid, (3) state, and possibly (4) user parameters.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:51
Type | Values Removed | Values Added |
---|---|---|
References | () http://drupal.org/node/313054 - | |
References | () http://lists.grok.org.uk/pipermail/full-disclosure/2008-September/064662.html - Exploit | |
References | () http://secunia.com/advisories/32015 - Vendor Advisory | |
References | () http://securityreason.com/securityalert/4338 - | |
References | () http://www.securityfocus.com/archive/1/496726/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/31387 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/45411 - |
Information
Published : 2008-09-30 17:22
Updated : 2024-11-21 00:51
NVD link : CVE-2008-4338
Mitre link : CVE-2008-4338
CVE.ORG link : CVE-2008-4338
JSON object : View
Products Affected
vacilanda
- brilliant_gallery
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')