Description
A vulnerability was found in lmxcms 1.41 and classified as critical. Affected by this issue is the function reply of the file BookAction.class.php. The manipulation of the argument id with the input 1) and updatexml(0,concat(0x7e,user()),1)# leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222728.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-23580 | A vulnerability was found in lmxcms 1.41 and classified as critical. Affected by this issue is the function reply of the file BookAction.class.php. The manipulation of the argument id with the input 1) and updatexml(0,concat(0x7e,user()),1)# leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222728. |
References
| Link | Providers |
|---|---|
| https://vuldb.com/?ctiid.222728 |
|
| https://vuldb.com/?id.222728 |
|
History
No history.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2024-08-02T05:41:00.068Z
Reserved: 2023-03-10T15:44:14.837Z
Link: CVE-2023-1322
No data.
Status : Modified
Published: 2023-03-10T16:15:11.173
Modified: 2024-11-21T07:38:55.277
Link: CVE-2023-1322
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD