Vulnerability Description
SQL injection vulnerability in inc/lib/Control/Backend/posts.control.php in GeniXCMS 0.0.8 allows remote authenticated administrators to execute arbitrary SQL commands via the id parameter to gxadmin/index.php.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Genixcms | Genixcms | 0.0.8 |
Related Weaknesses (CWE)
References
- http://code610.blogspot.com/2017/01/genixcms-sql-injection-quick-autopsy.htmlExploitThird Party Advisory
- http://www.securityfocus.com/bid/95655Third Party AdvisoryVDB Entry
- https://github.com/semplon/GeniXCMS/issues/61ExploitIssue TrackingPatch
- http://code610.blogspot.com/2017/01/genixcms-sql-injection-quick-autopsy.htmlExploitThird Party Advisory
- http://www.securityfocus.com/bid/95655Third Party AdvisoryVDB Entry
- https://github.com/semplon/GeniXCMS/issues/61ExploitIssue TrackingPatch
FAQ
What is CVE-2017-5346?
CVE-2017-5346 is a vulnerability with a CVSS score of 7.2 (HIGH). SQL injection vulnerability in inc/lib/Control/Backend/posts.control.php in GeniXCMS 0.0.8 allows remote authenticated administrators to execute arbitrary SQL commands via the id parameter to gxadmin/...
How severe is CVE-2017-5346?
CVE-2017-5346 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-5346?
Check the references section above for vendor advisories and patch information. Affected products include: Genixcms Genixcms.