In REDAXO before 5.6.3, a critical SQL injection vulnerability has been discovered in the rex_list class because of the prepareQuery function in core/lib/list.php, via the index.php?page=users/users sort parameter. Endangered was the backend and the frontend only if rex_list were used.
References
Link | Resource |
---|---|
https://github.com/redaxo/redaxo/issues/2043 | Exploit Third Party Advisory |
https://github.com/redaxo/redaxo/releases/tag/5.6.3 | Release Notes Third Party Advisory |
https://redaxo.org/cms/news/sicherheitsluecke-und-neue-yform-version/ | Vendor Advisory |
https://github.com/redaxo/redaxo/issues/2043 | Exploit Third Party Advisory |
https://github.com/redaxo/redaxo/releases/tag/5.6.3 | Release Notes Third Party Advisory |
https://redaxo.org/cms/news/sicherheitsluecke-und-neue-yform-version/ | Vendor Advisory |
Configurations
History
21 Nov 2024, 03:55
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/redaxo/redaxo/issues/2043 - Exploit, Third Party Advisory | |
References | () https://github.com/redaxo/redaxo/releases/tag/5.6.3 - Release Notes, Third Party Advisory | |
References | () https://redaxo.org/cms/news/sicherheitsluecke-und-neue-yform-version/ - Vendor Advisory |
Information
Published : 2018-10-01 08:29
Updated : 2024-11-21 03:55
NVD link : CVE-2018-17831
Mitre link : CVE-2018-17831
CVE.ORG link : CVE-2018-17831
JSON object : View
Products Affected
redaxo
- redaxo
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')