A vulnerability was found in happyman twmap. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file twmap3/data/ajaxCRUD/pointdata2.php. The manipulation of the argument id leads to sql injection. Upgrading to version v2.9_v4.31 is able to address this issue. The identifier of the patch is babbec79b3fa4efb3bd581ea68af0528d11bba0c. It is recommended to upgrade the affected component. The identifier VDB-217645 was assigned to this vulnerability.
References
Link | Resource |
---|---|
https://github.com/happyman/twmap/commit/babbec79b3fa4efb3bd581ea68af0528d11bba0c | Patch |
https://github.com/happyman/twmap/issues/42 | Issue Tracking Third Party Advisory |
https://github.com/happyman/twmap/releases/tag/v2.9_v4.31 | Release Notes |
https://vuldb.com/?ctiid.217645 | Third Party Advisory |
https://vuldb.com/?id.217645 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: VulDB
Published: 2023-01-08T10:34:20.523Z
Updated: 2023-10-20T12:54:24.101Z
Reserved: 2023-01-08T10:33:22.328Z
Link: CVE-2019-25100
JSON object: View
NVD Information
Status : Modified
Published: 2023-01-08T11:15:10.130
Modified: 2024-05-17T01:36:42.350
Link: CVE-2019-25100
JSON object: View
Redhat Information
No data.
CWE