Vulnerability Description
SQL injection vulnerability in client-edit.php in ProjectSend (formerly cFTP) r561 allows remote authenticated users to execute arbitrary SQL commands via the id parameter to users-edit.php.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Projectsend | Projectsend | 561 |
Related Weaknesses (CWE)
References
- http://osvdb.org/show/osvdb/119169
- http://packetstormsecurity.com/files/130691/ProjectSend-r561-SQL-Injection.htmlExploit
- http://seclists.org/fulldisclosure/2015/Mar/30Exploit
- http://www.exploit-db.com/exploits/36303Exploit
- http://www.itas.vn/news/itas-team-found-out-a-SQL-Injection-vulnerability-in-proExploit
- http://www.securityfocus.com/archive/1/534832/100/0/threaded
- http://osvdb.org/show/osvdb/119169
- http://packetstormsecurity.com/files/130691/ProjectSend-r561-SQL-Injection.htmlExploit
- http://seclists.org/fulldisclosure/2015/Mar/30Exploit
- http://www.exploit-db.com/exploits/36303Exploit
- http://www.itas.vn/news/itas-team-found-out-a-SQL-Injection-vulnerability-in-proExploit
- http://www.securityfocus.com/archive/1/534832/100/0/threaded
FAQ
What is CVE-2015-2564?
CVE-2015-2564 is a vulnerability with a CVSS score of 6.5 (MEDIUM). SQL injection vulnerability in client-edit.php in ProjectSend (formerly cFTP) r561 allows remote authenticated users to execute arbitrary SQL commands via the id parameter to users-edit.php.
How severe is CVE-2015-2564?
CVE-2015-2564 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-2564?
Check the references section above for vendor advisories and patch information. Affected products include: Projectsend Projectsend.