Multiple SQL injection vulnerabilities in EllisLab ExpressionEngine before 2.9.1 allow remote authenticated users to execute arbitrary SQL commands via the (1) column_filter or (2) category[] parameter to system/index.php or the (3) tbl_sort[0][] parameter in the comment module to system/index.php.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:11
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/128946/EllisLab-ExpressionEngine-Core-SQL-Injection.html - Exploit | |
References | () http://seclists.org/fulldisclosure/2014/Nov/2 - Exploit | |
References | () http://www.securityfocus.com/bid/70875 - Exploit | |
References | () https://ellislab.com/expressionengine/user-guide/about/changelog.html - | |
References | () https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-5387 - Exploit |
Information
Published : 2014-11-04 15:55
Updated : 2024-11-21 02:11
NVD link : CVE-2014-5387
Mitre link : CVE-2014-5387
CVE.ORG link : CVE-2014-5387
JSON object : View
Products Affected
expressionengine
- expressionengine
ellislab
- expressionengine
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')