Description
An issue was discovered in Square 9 GlobalForms 6.2.x. A Time Based SQL injection vulnerability in the "match" parameter allows remote authenticated attackers to execute arbitrary SQL commands. It is possible to upgrade access to full server compromise via xp_cmdshell. In some cases, the authentication requirement for the attack can be met by sending the default admin credentials.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
| Link | Providers |
|---|---|
| http://seclists.org/fulldisclosure/2018/Mar/57 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T07:02:26.027Z
Reserved: 2018-03-20T00:00:00.000Z
Link: CVE-2018-8820
No data.
Status : Modified
Published: 2018-03-28T20:29:00.333
Modified: 2024-11-21T04:14:23.017
Link: CVE-2018-8820
No data.
OpenCVE Enrichment
No data.
Weaknesses