SQL injection can occur in We-com Municipality portal CMS 2.1.x via the cerca/ keywords field.
References
Link | Resource |
---|---|
https://cxsecurity.com/issue/WLB-2020060011 | Exploit Third Party Advisory |
https://packetstormsecurity.com/files/157886/We-Com-Municipality-Portal-CMS-2.1.x-Cross-Site-Scripting-SQL-Injection.html | Exploit Third Party Advisory VDB Entry |
https://cxsecurity.com/issue/WLB-2020060011 | Exploit Third Party Advisory |
https://packetstormsecurity.com/files/157886/We-Com-Municipality-Portal-CMS-2.1.x-Cross-Site-Scripting-SQL-Injection.html | Exploit Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 05:05
Type | Values Removed | Values Added |
---|---|---|
References | () https://cxsecurity.com/issue/WLB-2020060011 - Exploit, Third Party Advisory | |
References | () https://packetstormsecurity.com/files/157886/We-Com-Municipality-Portal-CMS-2.1.x-Cross-Site-Scripting-SQL-Injection.html - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2020-07-05 16:15
Updated : 2024-11-21 05:05
NVD link : CVE-2020-15539
Mitre link : CVE-2020-15539
CVE.ORG link : CVE-2020-15539
JSON object : View
Products Affected
we-com
- municipality_portal_cms
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')