CVE-2009-3118
Published Sep 9, 2009
Last updated 15 years ago
Overview
- Description
- SQL injection vulnerability in mod/poll/comment.php in the vote module in Danneo CMS 0.5.2 and earlier allows remote attackers to execute arbitrary SQL commands via the comtext parameter, in conjunction with crafted comname and comtitle parameters, in a poll action to index.php, related to incorrect input sanitization in base/danneo.function.php.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-89
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:danneo:cms:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A61C4D44-70DD-400C-82B0-33160DCCB9A8", "versionEndIncluding": "0.5.2" }, { "criteria": "cpe:2.3:a:danneo:cms:0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F34DB705-9A63-4B8A-953D-FA046D067412" }, { "criteria": "cpe:2.3:a:danneo:cms:0.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3096EA16-F0C8-4636-9CD1-D97CC05B7528" } ], "operator": "OR" } ] } ]