cve/2009/CVE-2009-3118.md

18 lines
831 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2009-3118](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3118)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
SQL injection vulnerability in mod/poll/comment.php in the vote module in Danneo CMS 0.5.2 and earlier allows remote attackers to execute arbitrary SQL commands via the comtext parameter, in conjunction with crafted comname and comtitle parameters, in a poll action to index.php, related to incorrect input sanitization in base/danneo.function.php.
### POC
#### Reference
- http://packetstormsecurity.org/0908-exploits/danneo052-sql.txt
#### Github
No PoCs found on GitHub currently.