cve/2022/CVE-2022-33148.md

18 lines
994 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-33148](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33148)
![](https://img.shields.io/static/v1?label=Product&message=AVideo&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%2011.6%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20('SQL%20Injection')&color=brighgreen)
### Description
A sql injection vulnerability exists in the ObjectYPT functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to a SQL injection. An attacker can send an HTTP request to trigger this vulnerability.This vulnerability exists in the Live Schedules plugin, allowing an attacker to inject SQL by manipulating the title parameter.
### POC
#### Reference
- https://talosintelligence.com/vulnerability_reports/TALOS-2022-1551
#### Github
No PoCs found on GitHub currently.