Ovidentia CMS 6.x contains a SQL injection vulnerability in the "id" parameter of index.php. The "checkbox" property into "text" data can be extracted and displayed in the text region or in source code.
References
| Link | Resource |
|---|---|
| http://ovidentia.org | Vendor Advisory |
| https://www.exploit-db.com/exploits/49707 | Exploit Third Party Advisory VDB Entry |
| http://ovidentia.org | Vendor Advisory |
| https://www.exploit-db.com/exploits/49707 | Exploit Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 06:00
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://ovidentia.org - Vendor Advisory | |
| References | () https://www.exploit-db.com/exploits/49707 - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2021-03-30 12:16
Updated : 2024-11-21 06:00
NVD link : CVE-2021-29343
Mitre link : CVE-2021-29343
CVE.ORG link : CVE-2021-29343
JSON object : View
Products Affected
ovidentia
- ovidentia
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
