Readymade Job Site Script has SQL Injection via the location_name array parameter to the /job URI.
References
Link | Resource |
---|---|
https://github.com/d4wner/Vulnerabilities-Report/blob/master/ready-made-job-site-script.md | Exploit Third Party Advisory |
https://github.com/d4wner/Vulnerabilities-Report/blob/master/ready-made-job-site-script.md | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:18
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/d4wner/Vulnerabilities-Report/blob/master/ready-made-job-site-script.md - Exploit, Third Party Advisory |
Information
Published : 2017-12-27 17:08
Updated : 2024-11-21 03:18
NVD link : CVE-2017-17895
Mitre link : CVE-2017-17895
CVE.ORG link : CVE-2017-17895
JSON object : View
Products Affected
basic_job_site_script_project
- basic_job_site_script
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')