admin\db\DoSql.php in EmpireCMS through 7.5 allows remote attackers to execute arbitrary PHP code via SQL injection that uses a .php filename in a SELECT INTO OUTFILE statement to admin/admin.php.
References
Configurations
History
21 Nov 2024, 03:57
Type | Values Removed | Values Added |
---|---|---|
References | () http://i.3001.net/uploads/Up_imgs/20181118-2c996e3b89d19c9c9e6761ef67fd6d5c.png%21small - | |
References | () http://i.3001.net/uploads/Up_imgs/20181118-87192261fa34cad723bc7d8b8ca2cd17.png - Exploit, Third Party Advisory | |
References | () http://i.3001.net/uploads/Up_imgs/20181118-ca3d385ac6cf2d231da185b4bb844bad.png%21small - | |
References | () https://github.com/novysodope/empireCMS7.5 - Exploit, Third Party Advisory |
07 Nov 2023, 02:55
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2019-06-07 17:29
Updated : 2024-11-21 03:57
NVD link : CVE-2018-19462
Mitre link : CVE-2018-19462
CVE.ORG link : CVE-2018-19462
JSON object : View
Products Affected
phome
- empirecms
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')