CVE-2020-12461
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
PHP-Fusion 9.03.50 allows SQL Injection because maincore.php has an insufficient protection mechanism. An attacker can develop a crafted payload that can be inserted into the sort_order GET parameter on the members.php members search page. This parameter allows for control over anything after the ORDER BY clause in the SQL query.
PHP-Fusion versión 9.03.50, permite una inyección SQL porque el archivo maincore.php posee un mecanismo de protección insuficiente. Un atacante puede desarrollar una carga útil especialmente diseñada que se puede insertar en el parámetro GET sort_order en la página de búsqueda de miembros members.php. Este parámetro permite el control sobre cualquier cosa después de la cláusula ORDER BY en la consulta SQL.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-04-29 CVE Reserved
- 2020-04-29 CVE Published
- 2024-01-15 EPSS Updated
- 2024-08-04 CVE Updated
- 2024-08-04 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CAPEC
References (5)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://github.com/php-fusion/PHP-Fusion/issues/2308 | 2024-08-04 | |
https://hackmd.io/lq7nA3ISSoeiGjiHVn5CoA | 2024-08-04 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Php-fusion Search vendor "Php-fusion" | Php-fusion Search vendor "Php-fusion" for product "Php-fusion" | 9.03.50 Search vendor "Php-fusion" for product "Php-fusion" and version "9.03.50" | - |
Affected
|