Vulnerability Description
An issue was discovered in Appnitro MachForm before 4.2.3. When the form is set to filter a blacklist, it automatically adds dangerous extensions to the filters. If the filter is set to a whitelist, the dangerous extensions can be bypassed through ap_form_elements SQL Injection.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Machform | Machform | 4.2.3 |
Related Weaknesses (CWE)
References
- https://metalamin.github.io/MachForm-not-0-day-EN/ExploitThird Party Advisory
- https://www.exploit-db.com/exploits/44804/ExploitThird Party AdvisoryVDB Entry
- https://www.machform.com/blog-machform-423-security-release/Release NotesVendor Advisory
- https://metalamin.github.io/MachForm-not-0-day-EN/ExploitThird Party Advisory
- https://www.exploit-db.com/exploits/44804/ExploitThird Party AdvisoryVDB Entry
- https://www.machform.com/blog-machform-423-security-release/Release NotesVendor Advisory
FAQ
What is CVE-2018-6411?
CVE-2018-6411 is a vulnerability with a CVSS score of 9.8 (CRITICAL). An issue was discovered in Appnitro MachForm before 4.2.3. When the form is set to filter a blacklist, it automatically adds dangerous extensions to the filters. If the filter is set to a whitelist, t...
How severe is CVE-2018-6411?
CVE-2018-6411 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2018-6411?
Check the references section above for vendor advisories and patch information. Affected products include: Machform Machform.