Description
SQL injection vulnerability in ajax.php in Gregarius 0.5.4 and earlier allows remote attackers to execute arbitrary SQL commands via the rsargs array parameter in an __exp__getFeedContent action.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by GulfTech Security · textwebappsphp
https://www.exploit-db.com/exploits/6159
References (7)
Core 7
Core References
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/31260
Various Sources x_refsource_confirm
http://svn.gregarius.net/trac/changeset/1788/trunk/gregarius/ajax.php
Exploit x_refsource_misc
http://www.gulftech.org/?node=research&article_id=00119-07302008
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/6159
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/30423
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/44054
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/494866/100/0/threaded
Scores
EPSS
0.0091
EPSS Percentile
75.9%
Details
CWE
CWE-89
Status
published
Products (11)
gregarius/gregarius
0.2.4
gregarius/gregarius
0.3.0
gregarius/gregarius
0.3.2
gregarius/gregarius
0.3.4
gregarius/gregarius
0.3.6
gregarius/gregarius
0.3.8
gregarius/gregarius
0.4.0
gregarius/gregarius
0.4.2
gregarius/gregarius
0.5.0
gregarius/gregarius
0.5.2
... and 1 more
Published
Jul 30, 2008
Tracked Since
Feb 18, 2026