SQL injection vulnerability in the store function in _phenotype/system/class/PhenoTypeDataObject.class.php in Phenotype CMS 3.0 allows remote attackers to execute arbitrary SQL commands via a crafted URI, as demonstrated by Gallery/gal_id/1/image1,1.html. NOTE: some of these details are obtained from third party information.
References
Configurations
History
21 Nov 2024, 01:23
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/70308 - | |
References | () http://secunia.com/advisories/42837 - Vendor Advisory | |
References | () http://www.htbridge.ch/advisory/sql_injection_in_phenotype_cms.html - Exploit | |
References | () http://www.securityfocus.com/archive/1/515577/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/45700 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/64538 - |
Information
Published : 2011-01-11 03:00
Updated : 2024-11-21 01:23
NVD link : CVE-2011-0407
Mitre link : CVE-2011-0407
CVE.ORG link : CVE-2011-0407
JSON object : View
Products Affected
phenotype-cms
- phenotype_cms
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')