SQL injection vulnerability in the gen_show_status function in functions.inc.php in Postfix Admin (aka postfixadmin) before 2.3.7 allows remote authenticated users to execute arbitrary SQL commands via a new alias.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:06
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-updates/2014-05/msg00075.html - | |
References | () http://sourceforge.net/p/postfixadmin/code/1650 - Exploit, Patch | |
References | () http://www.debian.org/security/2014/dsa-2889 - | |
References | () http://www.openwall.com/lists/oss-security/2014/03/26/11 - | |
References | () http://www.openwall.com/lists/oss-security/2014/03/26/6 - | |
References | () http://www.securityfocus.com/bid/66455 - |
Information
Published : 2014-04-02 16:06
Updated : 2024-11-21 02:06
NVD link : CVE-2014-2655
Mitre link : CVE-2014-2655
CVE.ORG link : CVE-2014-2655
JSON object : View
Products Affected
postfix_admin_project
- postfix_admin
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')