### [CVE-2021-28242](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28242) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description SQL Injection in the "evoadm.php" component of b2evolution v7.2.2-stable allows remote attackers to obtain sensitive database information by injecting SQL commands into the "cf_name" parameter when creating a new filter under the "Collections" tab. ### POC #### Reference - http://packetstormsecurity.com/files/162489/b2evolution-7-2-2-SQL-Injection.html - https://deadsh0t.medium.com/authenticated-boolean-based-blind-error-based-sql-injection-b752225f0644 #### Github - https://github.com/2lambda123/CVE-mitre - https://github.com/ARPSyndicate/cvemon - https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame - https://github.com/nu11secur1ty/CVE-mitre