#VU43621 SQL injection in PHPlist - CVE-2012-2740
Published: September 6, 2012 / Updated: August 11, 2020
PHPlist
phplist.com
Description
The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.
The vulnerability exists due to insufficient sanitization of user-supplied data passed via the sortby parameter in a find action. A remote attacker can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.
Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.
Remediation
External links
- http://securitytracker.com/id?1027181
- http://www.exploit-db.com/exploits/18639
- http://www.openwall.com/lists/oss-security/2012/06/16/1
- http://www.openwall.com/lists/oss-security/2012/06/17/2
- http://www.securityfocus.com/bid/52657
- http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5081.php
- https://mantis.phplist.com/view.php?id=16557
- https://www.phplist.com/?lid=567