- Description
- Multiple SQL injection vulnerabilities in TLM CMS 3.2 allow remote attackers to execute arbitrary SQL commands via (1) the id parameter to news.php in a lirenews action, (2) the idnews parameter to goodies.php in a lire action, (3) the id parameter to file.php in a voir action, (4) the ID parameter to affichage.php, (5) the id_sal parameter to mod_forum/afficher.php, or (6) the id_sujet parameter to mod_forum/messages.php. NOTE: it was later reported that goodies.php and affichage.php scripts are reachable through index.php, and 1.1 is also affected. NOTE: it was later reported that the goodies.php vector also affects 3.1.
- Source
- cve@mitre.org
- NVD status
- Modified
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
- nvd@nist.gov
- CWE-89
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tlm_cms:tlm_cms:1.1:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "83FF3F9F-4E5A-47EB-80B5-C8A59A57D93C"
},
{
"criteria": "cpe:2.3:a:tlm_cms:tlm_cms:3.2:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "384EF97C-6D55-475F-BB57-2625B8C2BCBB"
}
],
"operator": "OR"
}
]
}
]