Multiple SQL injection vulnerabilities in the ajax_checklist_save function in the Ajax Checklist module 5.x before 5.x-1.1 for Drupal allow remote authenticated users, with "update ajax checklists" permissions, to execute arbitrary SQL commands via a save operation, related to the (1) nid, (2) qid, and (3) state parameters.
References
Link | Resource |
---|---|
http://drupal.org/node/312968 | Patch Vendor Advisory |
http://secunia.com/advisories/32009 | Vendor Advisory |
http://www.securityfocus.com/archive/1/496727/100/0/threaded | |
http://www.securityfocus.com/bid/31384 | Exploit Patch |
https://exchange.xforce.ibmcloud.com/vulnerabilities/45410 |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2009-01-28 15:30
Updated : 2024-02-04 17:33
NVD link : CVE-2008-5998
Mitre link : CVE-2008-5998
CVE.ORG link : CVE-2008-5998
JSON object : View
Products Affected
drupal
- ajax_checklist
- drupal
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')