CVE-2023-7191
S-CMS reg.php sql injection
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
A vulnerability, which was classified as critical, was found in S-CMS up to 2.0_build20220529-20231006. This affects an unknown part of the file member/reg.php. The manipulation of the argument M_login/M_email leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-249393 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Una vulnerabilidad fue encontrada en S-CMS hasta 2.0_build20220529-20231006 y clasificada como crítica. Una parte desconocida del archivo member/reg.php afecta a esta vulnerabilidad. La manipulación del argumento M_login/M_email conduce a la inyección de SQL. La explotación ha sido divulgada al público y puede utilizarse. A esta vulnerabilidad se le asignó el identificador VDB-249393. NOTA: Se contactó primeramente al proveedor sobre esta divulgación, pero no respondió de ninguna forma.
Es wurde eine kritische Schwachstelle in S-CMS bis 2.0_build20220529-20231006 gefunden. Dabei betrifft es einen unbekannter Codeteil der Datei member/reg.php. Dank Manipulation des Arguments M_login/M_email mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Exploit steht zur öffentlichen Verfügung.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2023-12-30 CVE Reserved
- 2023-12-31 CVE Published
- 2024-08-02 CVE Updated
- 2024-08-02 First Exploit
- 2025-01-06 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://vuldb.com/?id.249393 | Technical Description |
URL | Date | SRC |
---|---|---|
https://note.zhaoj.in/share/Fmytf7wBINbP | 2024-08-02 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
S-cms Search vendor "S-cms" | S-cms Search vendor "S-cms" for product "S-cms" | 1.0 Search vendor "S-cms" for product "S-cms" and version "1.0" | - |
Affected
| ||||||
S-cms Search vendor "S-cms" | S-cms Search vendor "S-cms" for product "S-cms" | 1.5 Search vendor "S-cms" for product "S-cms" and version "1.5" | - |
Affected
| ||||||
S-cms Search vendor "S-cms" | S-cms Search vendor "S-cms" for product "S-cms" | 2.0 Search vendor "S-cms" for product "S-cms" and version "2.0" | build_20220529-20231006 |
Affected
|