Description
doorGets 7.0 has a SQL injection vulnerability in /doorgets/app/requests/user/emailingRequest.php. A remote background administrator privilege user (or a user with permission to manage emailing) could exploit the vulnerability to obtain database sensitive information.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-3295 | doorGets 7.0 has a SQL injection vulnerability in /doorgets/app/requests/user/emailingRequest.php. A remote background administrator privilege user (or a user with permission to manage emailing) could exploit the vulnerability to obtain database sensitive information. |
References
| Link | Providers |
|---|---|
| https://github.com/itodaro/doorGets_cve |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T22:55:41.115Z
Reserved: 2019-04-30T00:00:00.000Z
Link: CVE-2019-11625
No data.
Status : Modified
Published: 2019-04-30T20:29:02.303
Modified: 2024-11-21T04:21:28.970
Link: CVE-2019-11625
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD