vendor:
Akronymmanager
by:
Redteam Pentesting
5.5
CVSS
MEDIUM
SQL Injection
89
CWE
Product Name: Akronymmanager
Affected Version From: <=0.5.0
Affected Version To: 7.0.0
Patch Exists: YES
Related CWE: CVE-2015-2803
CPE: a:typo3:typo3_extension:sb_akronymmanager
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: None
2015
Advisory: SQL Injection in TYPO3 Extension Akronymmanager
Users with the respective privileges can maintain acronyms through the Akronymmanager extension pages in the TYPO3 backend web interface. In the extension's file mod1/index.php, an SQL query is generated like follows (line 357 and following): The value of the user-supplied HTTP GET parametre 'id' is used without sanitizing it before its use in the subsequent SQL statement. Therefore, attackers are able to manipulate the resulting SQL statement and inject their own queries into the statement.
Mitigation:
Upgrade to the latest version of the extension (7.0.0)