Metinfo 6.x allows SQL Injection via the id parameter in an admin/index.php?n=ui_set&m=admin&c=index&a=doget_text_content&table=lang&field=1 request.
References
Link | Resource |
---|---|
https://github.com/zhuxianjin/vuln_repo/blob/master/Metinfo%206.x%20Background%20SQL%20injection.md | Exploit Third Party Advisory |
https://github.com/zhuxianjin/vuln_repo/blob/master/Metinfo%206.x%20Background%20SQL%20injection.md | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 04:25
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/zhuxianjin/vuln_repo/blob/master/Metinfo%206.x%20Background%20SQL%20injection.md - Exploit, Third Party Advisory |
Information
Published : 2019-07-19 06:15
Updated : 2024-11-21 04:25
NVD link : CVE-2019-13969
Mitre link : CVE-2019-13969
CVE.ORG link : CVE-2019-13969
JSON object : View
Products Affected
metinfo
- metinfo
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')