SQL injection vulnerability in dg-admin/index.php in doorGets CMS 5.2 and earlier allows remote authenticated administrators to execute arbitrary SQL commands via the _position_down_id parameter. NOTE: this can be leveraged using CSRF to allow remote attackers to execute arbitrary SQL commands.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:04
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/125078 - | |
References | () http://www.exploit-db.com/exploits/31521 - | |
References | () http://www.securityfocus.com/archive/1/530931/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/65439 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/90967 - | |
References | () https://github.com/doorgets/doorGets/commit/6b81541fc1e5dd1c70614585c1a04d04ccdb3b19 - | |
References | () https://www.htbridge.com/advisory/HTB23197 - |
Information
Published : 2014-02-11 17:55
Updated : 2025-04-11 00:51
NVD link : CVE-2014-1459
Mitre link : CVE-2014-1459
CVE.ORG link : CVE-2014-1459
JSON object : View
Products Affected
doorgets
- doorgets_cms
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')