vendor:
Oriol Espinal CMS
by:
TSAR
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Oriol Espinal CMS
Affected Version From: ALL VERSION UP TO LATEST
Affected Version To: ALL VERSION UP TO LATEST
Patch Exists: NO
Related CWE: N/A
CPE: a:oriol_espinal:oriol_espinal_cms
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: MACOS 10.11.2
2020
Oriol Espinal CMS 1.0 – ‘id’ SQL Injection
Oriol Espinal CMS is vulnerable to a remote SQL injection vulnerability, where an attacker can inject malicious SQL queries via the 'id' parameter in the 'editar.php' script. An attacker can also exploit a file upload vulnerability by sending a malicious POST request to the 'upload2_iframe.php' script.
Mitigation:
Input validation should be used to prevent SQL injection attacks. File uploads should be restricted to only allow certain file types and should be validated.