Description
SQL injection vulnerability in the art_print function in print.inc.php in unknown versions of jPortal before 2.3.1 allows remote attackers to inject arbitrary SQL commands via the id parameter.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Maciek Wierciski · textwebappsphp
https://www.exploit-db.com/exploits/24151
References (7)
Core 7
Core References
Exploit, Vendor Advisory vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/10430
Exploit, Vendor Advisory x_refsource_misc
http://www.securiteam.com/unixfocus/5HP020KD5K.html
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=108577011129476&w=2
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://securitytracker.com/id?1010327
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/16272
Exploit, Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/11737
Exploit, Vendor Advisory vdb-entry
x_refsource_osvdb
http://www.osvdb.org/6503
Scores
EPSS
0.0116
EPSS Percentile
78.8%
Details
Status
published
Products (1)
jportal/jportal_web_portal
2.2.1
Published
May 28, 2004
Tracked Since
Feb 18, 2026