#VU40895 SQL injection in Pragyan CMS - CVE-2015-1471
Published: February 12, 2015 / Updated: August 9, 2020
Pragyan CMS
Pragyan CMS
Description
The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.
The vulnerability exists due to insufficient sanitization of user-supplied data passed via the user parameter to the default URI. A remote attacker can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.
Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.
Remediation
External links
- http://pastebin.com/ip2gGYuS
- http://seclists.org/fulldisclosure/2015/Feb/18
- http://seclists.org/oss-sec/2015/q1/402
- http://sroesemann.blogspot.de/2015/01/sroeadv-2015-11.html
- http://sroesemann.blogspot.de/2015/02/advisory-for-sroeadv-2015-11.html
- https://github.com/delta/pragyan/commit/c93bc100ec93fc78940fbdca9b6b009101858309
- https://github.com/delta/pragyan/issues/206