1 results (0.001 seconds)

CVSS: 6.0EPSS: 0%CPEs: 3EXPL: 2

SQL injection vulnerability in the brilliant_gallery_checklist_save function in the bgchecklist/save script in Brilliant Gallery 5.x and 6.x, a module for Drupal, allows remote authenticated users with "access brilliant_gallery" permissions to execute arbitrary SQL commands via the (1) nid, (2) qid, (3) state, and possibly (4) user parameters. Vulnerabilidad de inyección SQL en la función brilliant_gallery_checklist_save bgchecklist/save en el módulo para Drupal Brilliant Gallery Script v5.x y 6.x, permite a usuarios autenticados remotamente con permisos "access brilliant_gallery" ejecutar comandos SQL de su elección a través de los parámetros (1) "nid", (2) "qid", (3) "state" y posiblemente (4) "user". • http://drupal.org/node/313054 http://lists.grok.org.uk/pipermail/full-disclosure/2008-September/064662.html http://secunia.com/advisories/32015 http://securityreason.com/securityalert/4338 http://www.securityfocus.com/archive/1/496726/100/0/threaded http://www.securityfocus.com/bid/31387 https://exchange.xforce.ibmcloud.com/vulnerabilities/45411 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •