Vulnerability Description
SQL injection with start and length parameters in Records.php for phpzag live add edit delete data tables records with ajax php mysql
CVSS Score
9.8
CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Phpzag | Phpzag | - |
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2020/07/09/1ExploitThird Party Advisory
- http://www.vapidlabs.com/advisory.php?v=213ExploitThird Party Advisory
- https://www.phpzag.com/live-add-edit-delete-datatables-records-with-ajax-php-mysProductVendor Advisory
- http://www.openwall.com/lists/oss-security/2020/07/09/1ExploitThird Party Advisory
- http://www.vapidlabs.com/advisory.php?v=213ExploitThird Party Advisory
- https://www.phpzag.com/live-add-edit-delete-datatables-records-with-ajax-php-mysProductVendor Advisory
FAQ
What is CVE-2020-8521?
CVE-2020-8521 is a vulnerability with a CVSS score of 9.8 (CRITICAL). SQL injection with start and length parameters in Records.php for phpzag live add edit delete data tables records with ajax php mysql
How severe is CVE-2020-8521?
CVE-2020-8521 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2020-8521?
Check the references section above for vendor advisories and patch information. Affected products include: Phpzag Phpzag.