SQL injection vulnerability in the autoDetectRegion function in doceboCore/lib/lib.regset.php in Docebo 3.5.0.3 and earlier allows remote attackers to execute arbitrary SQL commands via the Accept-Language HTTP header. NOTE: this can be leveraged to execute arbitrary PHP code using the INTO DUMPFILE command.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:58
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/40138 - | |
References | () http://secunia.com/advisories/28378 - Vendor Advisory | |
References | () http://www.docebo.org/doceboCms/bugtracker/18_124/bugdetails/appid_24-bugid_198/bugtracker.html - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/27211 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/39589 - | |
References | () https://www.exploit-db.com/exploits/4879 - | |
References | () https://www.exploit-db.com/exploits/4891 - |
Information
Published : 2009-09-02 17:30
Updated : 2024-11-21 00:58
NVD link : CVE-2008-7153
Mitre link : CVE-2008-7153
CVE.ORG link : CVE-2008-7153
JSON object : View
Products Affected
docebo
- docebo
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')