- Description
- SQL injection vulnerability in mod/poll/comment.php in the vote module in Danneo CMS 0.5.2 and earlier allows remote attackers to execute arbitrary SQL commands via the comtext parameter, in conjunction with crafted comname and comtitle parameters, in a poll action to index.php, related to incorrect input sanitization in base/danneo.function.php.
- Source
- cve@mitre.org
- NVD status
- Analyzed
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
- nvd@nist.gov
- CWE-89
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:danneo:cms:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "A61C4D44-70DD-400C-82B0-33160DCCB9A8",
"versionEndIncluding": "0.5.2"
},
{
"criteria": "cpe:2.3:a:danneo:cms:0.5:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "F34DB705-9A63-4B8A-953D-FA046D067412"
},
{
"criteria": "cpe:2.3:a:danneo:cms:0.5.1:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "3096EA16-F0C8-4636-9CD1-D97CC05B7528"
}
],
"operator": "OR"
}
]
}
]