An unauthenticated attacker can perform an SQL injection by accessing the /class/dbconnect.php file and supplying malicious GET parameters. The HTTP GET parameters search, table, field, and value are vulnerable. For example, one SQL injection can be performed on the parameter "field" with the UNION keyword.
Metrics
Affected Vendors & Products
References
History
Mon, 03 Nov 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 13 Dec 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Thu, 12 Dec 2024 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An unauthenticated attacker can perform an SQL injection by accessing the /class/dbconnect.php file and supplying malicious GET parameters. The HTTP GET parameters search, table, field, and value are vulnerable. For example, one SQL injection can be performed on the parameter "field" with the UNION keyword. | |
| Title | Unauthenticated SQL Injection | |
| Weaknesses | CWE-89 | |
| References |
|
Status: PUBLISHED
Assigner: SEC-VLab
Published: 2024-12-12T13:36:34.917Z
Updated: 2025-11-03T21:54:31.104Z
Reserved: 2024-03-05T09:15:40.202Z
Link: CVE-2024-28145
Updated: 2025-11-03T21:54:31.104Z
Status : Awaiting Analysis
Published: 2024-12-12T14:15:22.467
Modified: 2025-11-03T22:16:50.503
Link: CVE-2024-28145
No data.