A vulnerability was found in lmxcms 1.41 and classified as critical. Affected by this issue is the function reply of the file BookAction.class.php. The manipulation of the argument id with the input 1) and updatexml(0,concat(0x7e,user()),1)# leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222728.
References
Link | Resource |
---|---|
https://vuldb.com/?ctiid.222728 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.222728 | Permissions Required Third Party Advisory |
Configurations
History
15 Mar 2023, 16:06
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CPE | cpe:2.3:a:lmxcms:lmxcms:1.41:*:*:*:*:*:*:* | |
References | (MISC) https://vuldb.com/?id.222728 - Permissions Required, Third Party Advisory | |
References | (MISC) https://vuldb.com/?ctiid.222728 - Permissions Required, Third Party Advisory |
10 Mar 2023, 17:23
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-03-10 16:15
Updated : 2024-05-17 02:17
NVD link : CVE-2023-1322
Mitre link : CVE-2023-1322
CVE.ORG link : CVE-2023-1322
JSON object : View
Products Affected
lmxcms
- lmxcms
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')