SQL injection vulnerability in mod/poll/comment.php in the vote module in Danneo CMS 0.5.2 and earlier allows remote attackers to execute arbitrary SQL commands via the comtext parameter, in conjunction with crafted comname and comtitle parameters, in a poll action to index.php, related to incorrect input sanitization in base/danneo.function.php.
References
Link | Resource |
---|---|
http://packetstormsecurity.org/0908-exploits/danneo052-sql.txt | Exploit |
http://secunia.com/advisories/36440 | Vendor Advisory |
http://www.vupen.com/english/advisories/2009/2459 | Vendor Advisory |
http://packetstormsecurity.org/0908-exploits/danneo052-sql.txt | Exploit |
http://secunia.com/advisories/36440 | Vendor Advisory |
http://www.vupen.com/english/advisories/2009/2459 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:06
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.org/0908-exploits/danneo052-sql.txt - Exploit | |
References | () http://secunia.com/advisories/36440 - Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2009/2459 - Vendor Advisory |
Information
Published : 2009-09-09 22:30
Updated : 2024-11-21 01:06
NVD link : CVE-2009-3118
Mitre link : CVE-2009-3118
CVE.ORG link : CVE-2009-3118
JSON object : View
Products Affected
danneo
- cms
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')