A sql injection vulnerability exists in the ObjectYPT functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to a SQL injection. An attacker can send an HTTP request to trigger this vulnerability.This vulnerability exists in the Live Schedules plugin, allowing an attacker to inject SQL by manipulating the title parameter.
References
Link | Resource |
---|---|
https://github.com/WWBN/AVideo/blob/e04b1cd7062e16564157a82bae389eedd39fa088/updatedb/updateDb.v12.0.sql | Third Party Advisory |
https://talosintelligence.com/vulnerability_reports/TALOS-2022-1551 | Technical Description Third Party Advisory |
https://github.com/WWBN/AVideo/blob/e04b1cd7062e16564157a82bae389eedd39fa088/updatedb/updateDb.v12.0.sql | Third Party Advisory |
https://talosintelligence.com/vulnerability_reports/TALOS-2022-1551 | Technical Description Third Party Advisory |
Configurations
History
21 Nov 2024, 07:07
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/WWBN/AVideo/blob/e04b1cd7062e16564157a82bae389eedd39fa088/updatedb/updateDb.v12.0.sql - Third Party Advisory | |
References | () https://talosintelligence.com/vulnerability_reports/TALOS-2022-1551 - Technical Description, Third Party Advisory |
Information
Published : 2022-08-22 19:15
Updated : 2024-11-21 07:07
NVD link : CVE-2022-33148
Mitre link : CVE-2022-33148
CVE.ORG link : CVE-2022-33148
JSON object : View
Products Affected
wwbn
- avideo
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')