Vulnerability Description
SQL injection vulnerability in inc/lib/Control/Ajax/tags-ajax.control.php in GeniXCMS 0.0.8 allows remote authenticated editors to execute arbitrary SQL commands via the term parameter to the default URI.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Metalgenix | Genixcms | 0.0.8 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/95660Third Party AdvisoryVDB Entry
- https://github.com/semplon/GeniXCMS/commit/6e21c01d87672d81080450e6913e0093a02bfPatch
- https://github.com/semplon/GeniXCMS/issues/60ExploitIssue TrackingPatch
- http://www.securityfocus.com/bid/95660Third Party AdvisoryVDB Entry
- https://github.com/semplon/GeniXCMS/commit/6e21c01d87672d81080450e6913e0093a02bfPatch
- https://github.com/semplon/GeniXCMS/issues/60ExploitIssue TrackingPatch
FAQ
What is CVE-2017-5345?
CVE-2017-5345 is a vulnerability with a CVSS score of 8.8 (HIGH). SQL injection vulnerability in inc/lib/Control/Ajax/tags-ajax.control.php in GeniXCMS 0.0.8 allows remote authenticated editors to execute arbitrary SQL commands via the term parameter to the default ...
How severe is CVE-2017-5345?
CVE-2017-5345 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-5345?
Check the references section above for vendor advisories and patch information. Affected products include: Metalgenix Genixcms.