Ovidentia CMS 6.x contains a SQL injection vulnerability in the "id" parameter of index.php. The "checkbox" property into "text" data can be extracted and displayed in the text region or in source code.
References
Link | Resource |
---|---|
http://ovidentia.org | Vendor Advisory |
https://www.exploit-db.com/exploits/49707 | Exploit Third Party Advisory VDB Entry |
http://ovidentia.org | Vendor Advisory |
https://www.exploit-db.com/exploits/49707 | Exploit Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 06:00
Type | Values Removed | Values Added |
---|---|---|
References | () http://ovidentia.org - Vendor Advisory | |
References | () https://www.exploit-db.com/exploits/49707 - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2021-03-30 12:16
Updated : 2024-11-21 06:00
NVD link : CVE-2021-29343
Mitre link : CVE-2021-29343
CVE.ORG link : CVE-2021-29343
JSON object : View
Products Affected
ovidentia
- ovidentia
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')