Multiple SQL injection vulnerabilities in Octeth Oempro 3.5.5.1, and possibly other versions before 4, allow remote attackers to execute arbitrary SQL commands via the FormValue_Email parameter (aka Email field) to index.php in (1) member/, (2) client/, or (3) admin/; or (4) the FormValue_SearchKeywords parameter to client/campaign_track.php.
References
Configurations
History
21 Nov 2024, 00:48
Type | Values Removed | Values Added |
---|---|---|
References | () http://octeth.com/blog/category/oempro4/ - | |
References | () http://osvdb.org/ref/50/oempro.txt - Exploit | |
References | () http://www.osvdb.org/50322 - | |
References | () http://www.osvdb.org/50323 - | |
References | () http://www.securityfocus.com/bid/32784 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/47112 - |
Information
Published : 2008-12-03 17:30
Updated : 2024-11-21 00:48
NVD link : CVE-2008-3058
Mitre link : CVE-2008-3058
CVE.ORG link : CVE-2008-3058
JSON object : View
Products Affected
octeth
- oempro
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')