SQL injection vulnerability in client-edit.php in ProjectSend (formerly cFTP) r561 allows remote authenticated users to execute arbitrary SQL commands via the id parameter to users-edit.php.
References
Configurations
History
21 Nov 2024, 02:27
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/show/osvdb/119169 - | |
References | () http://packetstormsecurity.com/files/130691/ProjectSend-r561-SQL-Injection.html - Exploit | |
References | () http://seclists.org/fulldisclosure/2015/Mar/30 - Exploit | |
References | () http://www.exploit-db.com/exploits/36303 - Exploit | |
References | () http://www.itas.vn/news/itas-team-found-out-a-SQL-Injection-vulnerability-in-projectsend-r561-76.html - Exploit | |
References | () http://www.securityfocus.com/archive/1/534832/100/0/threaded - |
Information
Published : 2015-03-20 14:59
Updated : 2024-11-21 02:27
NVD link : CVE-2015-2564
Mitre link : CVE-2015-2564
CVE.ORG link : CVE-2015-2564
JSON object : View
Products Affected
projectsend
- projectsend
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')