Vulnerability Description
SQL injection vulnerability in the checkEmailFormat function in plugins/jojo_core/classes/Jojo.php in Jojo before 1.2.2 allows remote attackers to execute arbitrary SQL commands via the X-Forwarded-For HTTP header to /articles/test/.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Jojocms | Jojo-Cms | <= 1.2.1 |
Related Weaknesses (CWE)
References
- https://exchange.xforce.ibmcloud.com/vulnerabilities/84285
- https://github.com/JojoCMS/Jojo-CMS/commit/972757c4500d94b4b1306bf092e678add3a98ExploitPatch
- https://www.htbridge.com/advisory/HTB23153Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/84285
- https://github.com/JojoCMS/Jojo-CMS/commit/972757c4500d94b4b1306bf092e678add3a98ExploitPatch
- https://www.htbridge.com/advisory/HTB23153Exploit
FAQ
What is CVE-2013-3081?
CVE-2013-3081 is a vulnerability with a CVSS score of 7.5 (HIGH). SQL injection vulnerability in the checkEmailFormat function in plugins/jojo_core/classes/Jojo.php in Jojo before 1.2.2 allows remote attackers to execute arbitrary SQL commands via the X-Forwarded-Fo...
How severe is CVE-2013-3081?
CVE-2013-3081 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-3081?
Check the references section above for vendor advisories and patch information. Affected products include: Jojocms Jojo-Cms.