phpIPAM 1.4 allows SQL injection via the app/admin/custom-fields/order.php table parameter when action=add is used.
References
| Link | Resource |
|---|---|
| https://github.com/MarkLee131/awesome-web-pocs/blob/main/CVE-2019-16693.md | |
| https://github.com/phpipam/phpipam/issues/2738 | Exploit Issue Tracking Third Party Advisory |
| https://github.com/phpipam/phpipam/issues/2738 | Exploit Issue Tracking Third Party Advisory |
Configurations
History
16 Apr 2025, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Nov 2024, 04:30
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/phpipam/phpipam/issues/2738 - Exploit, Issue Tracking, Third Party Advisory |
Information
Published : 2019-09-22 15:15
Updated : 2025-04-16 15:15
NVD link : CVE-2019-16693
Mitre link : CVE-2019-16693
CVE.ORG link : CVE-2019-16693
JSON object : View
Products Affected
phpipam
- phpipam
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
