admin\db\DoSql.php in EmpireCMS through 7.5 allows remote attackers to execute arbitrary PHP code via SQL injection that uses a .php filename in a SELECT INTO OUTFILE statement to admin/admin.php.
References
Link | Resource |
---|---|
http://i.3001.net/uploads/Up_imgs/20181118-2c996e3b89d19c9c9e6761ef67fd6d5c.png%21small | |
http://i.3001.net/uploads/Up_imgs/20181118-87192261fa34cad723bc7d8b8ca2cd17.png | Exploit Third Party Advisory |
http://i.3001.net/uploads/Up_imgs/20181118-ca3d385ac6cf2d231da185b4bb844bad.png%21small | |
https://github.com/novysodope/empireCMS7.5 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2019-06-07 17:29
Updated : 2024-02-04 20:20
NVD link : CVE-2018-19462
Mitre link : CVE-2018-19462
CVE.ORG link : CVE-2018-19462
JSON object : View
Products Affected
phome
- empirecms
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')