An issue was discovered in MRCMS (aka mushroom) through 3.1.2. The WebParam.java file directly accepts the FIELD_T parameter in a request and uses it as a hash of SQL statements without filtering, resulting in a SQL injection vulnerability in getChannel() in the ChannelService.java file.
References
Link Resource
https://github.com/wuweiit/mushroom/issues/16 Exploit Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2018-09-30T20:00:00

Updated: 2018-09-30T20:57:01

Reserved: 2018-09-30T00:00:00


Link: CVE-2018-17796

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2018-09-30T20:29:00.507

Modified: 2018-11-21T23:19:14.377


Link: CVE-2018-17796

JSON object: View

cve-icon Redhat Information

No data.

CWE