Vulnerability Description
SQL injection vulnerability in the password recovery feature in Yeager CMS 1.2.1 allows remote attackers to change the account credentials of known users via the "userEmail" parameter.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Yeager | Yeager Cms | 1.2.1 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/135716/Yeager-CMS-1.2.1-File-Upload-SQL-InjExploitPatchThird Party Advisory
- http://seclists.org/fulldisclosure/2016/Feb/44Mailing ListPatchThird Party Advisory
- http://www.securityfocus.com/archive/1/537493/100/0/threadedExploitThird Party AdvisoryVDB Entry
- https://www.exploit-db.com/exploits/39436/ExploitPatchThird Party Advisory
- http://packetstormsecurity.com/files/135716/Yeager-CMS-1.2.1-File-Upload-SQL-InjExploitPatchThird Party Advisory
- http://seclists.org/fulldisclosure/2016/Feb/44Mailing ListPatchThird Party Advisory
- http://www.securityfocus.com/archive/1/537493/100/0/threadedExploitThird Party AdvisoryVDB Entry
- https://www.exploit-db.com/exploits/39436/ExploitPatchThird Party Advisory
FAQ
What is CVE-2015-7568?
CVE-2015-7568 is a vulnerability with a CVSS score of 9.8 (CRITICAL). SQL injection vulnerability in the password recovery feature in Yeager CMS 1.2.1 allows remote attackers to change the account credentials of known users via the "userEmail" parameter.
How severe is CVE-2015-7568?
CVE-2015-7568 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2015-7568?
Check the references section above for vendor advisories and patch information. Affected products include: Yeager Yeager Cms.