SQL Injection vulnerability in PbootCMS 1.4.1 in parsing if statements in templates, resulting in a malicious user's ability to contaminate template content by searching for page contamination URLs, thus triggering vulnerabilities when the program uses eval statements to parse templates.
References
| Link | Resource |
|---|---|
| https://github.com/SticKManII/SticKManII.github.io/tree/master/2019/07/31/PbootCMSv1-4-1-%E5%89%8D%E5%8F%B0%E6%90%9C%E7%B4%A2%E9%A1%B5%E9%9D%A2%E6%A8%A1%E6%9D%BF%E6%B3%A8%E5%85%A5 | Third Party Advisory |
| https://unh3x.github.io/2019/07/19/PbootCMSv1.4.1_Template_Injection/ | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-02-21 19:15
Updated : 2025-04-07 15:05
NVD link : CVE-2020-19248
Mitre link : CVE-2020-19248
CVE.ORG link : CVE-2020-19248
JSON object : View
Products Affected
pbootcms
- pbootcms
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
