Multiple SQL injection vulnerabilities in ATutor AContent before 1.2-1 allow remote attackers to execute arbitrary SQL commands via the (1) field parameter to course_category/index_inline_editor_submit.php or (2) user/index_inline_editor_submit.php; or (3) id parameter to user/user_password.php.
References
Configurations
History
21 Nov 2024, 01:44
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/bugtraq/2012-10/0095.html - Exploit | |
References | () http://osvdb.org/86424 - | |
References | () http://osvdb.org/86425 - | |
References | () http://secunia.com/advisories/51014 - Vendor Advisory | |
References | () http://secunia.com/advisories/51034 - Vendor Advisory | |
References | () http://update.atutor.ca/acontent/patch/1_2/ - Patch | |
References | () http://www.securityfocus.com/bid/56100 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/79459 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/79460 - | |
References | () https://www.htbridge.com/advisory/HTB23117 - Exploit |
Information
Published : 2012-10-22 23:55
Updated : 2024-11-21 01:44
NVD link : CVE-2012-5167
Mitre link : CVE-2012-5167
CVE.ORG link : CVE-2012-5167
JSON object : View
Products Affected
atutor
- acontent
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')