Description
SQL injection vulnerability in controlpanel.php in Jaws Framework and Content Management System 0.4 allows remote attackers to execute arbitrary SQL and bypass authentication via the (1) user, (2) password, or (3) crypted_password parameters.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Fernando Quintero · textwebappsphp
https://www.exploit-db.com/exploits/24334
References (6)
Core 6
Core References
Exploit, Vendor Advisory vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/10826
Various Sources x_refsource_confirm
http://www.jaws.com.mx/index.php?gadget=blog&action=single_view&id=10
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=109116345930380&w=2
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/8320
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://securitytracker.com/id?1010815
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/16847
Scores
EPSS
0.0158
EPSS Percentile
81.7%
Details
Status
published
Products (3)
jaws/jaws
0.2
jaws/jaws
0.3
jaws/jaws
0.4
Published
Jul 29, 2004
Tracked Since
Feb 18, 2026