SQL injection vulnerability in userprofile.lib.php in Pragyan CMS 3.0 allows remote attackers to execute arbitrary SQL commands via the user parameter to the default URI.
References
Configurations
History
21 Nov 2024, 02:25
Type | Values Removed | Values Added |
---|---|---|
References | () http://pastebin.com/ip2gGYuS - Exploit | |
References | () http://seclists.org/fulldisclosure/2015/Feb/18 - | |
References | () http://seclists.org/oss-sec/2015/q1/402 - | |
References | () http://sroesemann.blogspot.de/2015/01/sroeadv-2015-11.html - Exploit | |
References | () http://sroesemann.blogspot.de/2015/02/advisory-for-sroeadv-2015-11.html - Exploit | |
References | () https://github.com/delta/pragyan/commit/c93bc100ec93fc78940fbdca9b6b009101858309 - | |
References | () https://github.com/delta/pragyan/issues/206 - |
Information
Published : 2015-02-12 16:59
Updated : 2024-11-21 02:25
NVD link : CVE-2015-1471
Mitre link : CVE-2015-1471
CVE.ORG link : CVE-2015-1471
JSON object : View
Products Affected
pragyan_cms_project
- pragyan_cms
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')