BlueCMS 1.6 allows SQL Injection via the user_name parameter to uploads/user.php?act=index_login.
References
Link | Resource |
---|---|
http://hpdoger.me/2018/08/18/%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A1%E5%A4%8D%E7%8E%B0%EF%BC%9ABluecms%201.6/ | Exploit Third Party Advisory URL Repurposed |
http://hpdoger.me/2018/08/18/%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A1%E5%A4%8D%E7%8E%B0%EF%BC%9ABluecms%201.6/ | Exploit Third Party Advisory URL Repurposed |
Configurations
History
21 Nov 2024, 03:52
Type | Values Removed | Values Added |
---|---|---|
References | () http://hpdoger.me/2018/08/18/%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A1%E5%A4%8D%E7%8E%B0%EF%BC%9ABluecms%201.6/ - Exploit, Third Party Advisory, URL Repurposed |
14 Feb 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | () http://hpdoger.me/2018/08/18/%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A1%E5%A4%8D%E7%8E%B0%EF%BC%9ABluecms%201.6/ - Exploit, Third Party Advisory, URL Repurposed |
Information
Published : 2018-09-04 00:29
Updated : 2024-11-21 03:52
NVD link : CVE-2018-16432
Mitre link : CVE-2018-16432
CVE.ORG link : CVE-2018-16432
JSON object : View
Products Affected
bluecms_project
- bluecms
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')