An unauthenticated attacker can perform an SQL injection by accessing the /class/dbconnect.php file and supplying malicious GET parameters. The HTTP GET parameters search, table, field, and value are vulnerable. For example, one SQL injection can be performed on the parameter "field" with the UNION keyword.
References
Configurations
No configuration.
History
03 Nov 2025, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Information
Published : 2024-12-12 14:15
Updated : 2025-11-03 22:16
NVD link : CVE-2024-28145
Mitre link : CVE-2024-28145
CVE.ORG link : CVE-2024-28145
JSON object : View
Products Affected
No product.
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
