SQL injection in GeniXCMS - CVE-2016-10096
Published: January 1, 2017 / Updated: January 17, 2017
Vulnerability identifier: #VU3083
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2016-10096
CWE-ID: CWE-89
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: MetalGenix
Affected software:
GeniXCMS
GeniXCMS
Detailed vulnerability description
The vulnerability allows a remote attacker to execute arbitrary SQL commands in database.
The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can send specially crafted HTTP POST request with SQL operators in "activation" parameter to register.php script and execute arbitrary SQL commands in web application database.
Successful exploitation of the vulnerability may allow an attacker to gain complete control over vulnerable website.
The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can send specially crafted HTTP POST request with SQL operators in "activation" parameter to register.php script and execute arbitrary SQL commands in web application database.
Successful exploitation of the vulnerability may allow an attacker to gain complete control over vulnerable website.
How to mitigate CVE-2016-10096
Install update from GIT repository.