|
|||
Rule General Information |
---|
Release Date: | 2019-06-25 | |
Rule Name: | Sefrengo CMS Login Cookie SQL Injection Vulnerability (CVE-2015-1428) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | Multiple SQL injection vulnerabilities in Sefrengo before 1.6.2 allow (1) remote attackers to execute arbitrary SQL commands via the sefrengo cookie in a login to backend/main.php or (2) remote authenticated users to execute arbitrary SQL commands via the value_id parameter in a save_value action to backend/main.php. | |
Impact: | An attacker can inject arbitrary sql commands to view or change the database of the target by exploiting the vulnerability successfully. | |
Affected OS: | Windows, Linux, FreeBSD, Solaris, Other Unix, Network Device, Mac OS, iOS, Android, Others | |
Reference: | ExploitDB:35972 http://www.itas.vn/news/itas-team-found-out-multiple-sql-injection-vulnerabilities-in-sefrengo-cms-v1-6-1-74.html http://www.securityfocus.com/archive/1/534593/100/0/threaded https://github.com/sefrengo-cms/sefrengo-1.x/commit/0b1edd4b22a47743eff7cfaf884ba2a4e06e15eb |
|
Solutions |
---|
The vendors have released upgrade patches to fix vulnerabilities, please visit: http://forum.sefrengo.org/index.php?showtopic=3368 |