vendor:
JohnCMS
by:
Besim
9
CVSS
HIGH
SQL Injection
89
CWE
Product Name: JohnCMS
Affected Version From: 4.5.1
Affected Version To: 4.5.1
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: PHP
2016
JonhCMS 4.5.1 – (go.php?id) – SQL Injection
The vulnerability exists due to insufficient sanitization of user-supplied input in the 'id' parameter of the 'go.php' script. A remote attacker can execute arbitrary SQL commands in the application's database, cause denial of service, access or modify sensitive data, exploit various vulnerabilities in the underlying SQL server software, etc.
Mitigation:
Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being passed to the SQL server.