doorGets 7.0 has a SQL injection vulnerability in /doorgets/app/requests/user/configurationRequest.php when action=siteweb. A remote background administrator privilege user (or a user with permission to manage configuration siteweb) could exploit the vulnerability to obtain database sensitive information.
References
Link | Resource |
---|---|
https://github.com/itodaro/doorGets_cve | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-04-30T19:41:31
Updated: 2019-04-30T19:41:31
Reserved: 2019-04-30T00:00:00
Link: CVE-2019-11623
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-04-30T20:29:02.177
Modified: 2019-05-01T19:10:33.947
Link: CVE-2019-11623
JSON object: View
Redhat Information
No data.
CWE