PHP-Fusion 9.03.50 allows SQL Injection because maincore.php has an insufficient protection mechanism. An attacker can develop a crafted payload that can be inserted into the sort_order GET parameter on the members.php members search page. This parameter allows for control over anything after the ORDER BY clause in the SQL query.
References
Link | Resource |
---|---|
https://github.com/php-fusion/PHP-Fusion/commit/79fe5ec1d5c75e017a6f42127741b9543658f822 | Patch Third Party Advisory |
https://github.com/php-fusion/PHP-Fusion/commit/858e43d7b0ea1897f76d5bcb3a1aed438132c0e2 | Patch Third Party Advisory |
https://github.com/php-fusion/PHP-Fusion/commit/d95cd4a2d22487723266c898b98e6be10754e03d | Patch Third Party Advisory |
https://github.com/php-fusion/PHP-Fusion/issues/2308 | Exploit Third Party Advisory |
https://hackmd.io/lq7nA3ISSoeiGjiHVn5CoA | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2020-04-29T16:14:26
Updated: 2020-04-29T16:14:26
Reserved: 2020-04-29T00:00:00
Link: CVE-2020-12461
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-04-29T17:15:12.113
Modified: 2020-05-05T15:28:43.940
Link: CVE-2020-12461
JSON object: View
Redhat Information
No data.
CWE