Vulnerability Description
phpMyChat Plus 1.98 contains a SQL injection vulnerability in the deluser.php page through the pmc_username parameter that allows attackers to manipulate database queries. Attackers can exploit boolean-based, error-based, and time-based blind SQL injection techniques to extract sensitive database information by crafting malicious payloads in the username field.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ciprianmp | Phpmychat-Plus | 1.98 |
Related Weaknesses (CWE)
References
- http://ciprianmp.com/latest/Product
- https://www.exploit-db.com/exploits/48066ExploitThird Party AdvisoryVDB Entry
- https://www.vulncheck.com/advisories/phpmychat-plus-deluserphp-sql-injectionBroken LinkThird Party Advisory
FAQ
What is CVE-2020-37151?
CVE-2020-37151 is a vulnerability with a CVSS score of 8.2 (HIGH). phpMyChat Plus 1.98 contains a SQL injection vulnerability in the deluser.php page through the pmc_username parameter that allows attackers to manipulate database queries. Attackers can exploit boolea...
How severe is CVE-2020-37151?
CVE-2020-37151 has been rated HIGH with a CVSS base score of 8.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-37151?
Check the references section above for vendor advisories and patch information. Affected products include: Ciprianmp Phpmychat-Plus.