SQL injection vulnerability in search.php in Pligg CMS 1.1.2 allows remote attackers to execute arbitrary SQL commands via the status parameter.
References
Link | Resource |
---|---|
http://pligg.svn.sourceforge.net/viewvc/pligg/trunk/search.php?r1=2255&r2=2254&pathrev=2255 | |
https://sitewat.ch/Advisory/View/5 | Exploit URL Repurposed |
http://pligg.svn.sourceforge.net/viewvc/pligg/trunk/search.php?r1=2255&r2=2254&pathrev=2255 | |
https://sitewat.ch/Advisory/View/5 | Exploit URL Repurposed |
Configurations
History
21 Nov 2024, 01:33
Type | Values Removed | Values Added |
---|---|---|
References | () http://pligg.svn.sourceforge.net/viewvc/pligg/trunk/search.php?r1=2255&r2=2254&pathrev=2255 - | |
References | () https://sitewat.ch/Advisory/View/5 - Exploit, URL Repurposed |
14 Feb 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://sitewat.ch/Advisory/View/5 - Exploit, URL Repurposed |
Information
Published : 2011-12-29 11:55
Updated : 2024-11-21 01:33
NVD link : CVE-2011-5022
Mitre link : CVE-2011-5022
CVE.ORG link : CVE-2011-5022
JSON object : View
Products Affected
pligg
- pligg_cms
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')