CVE-2008-5998

Drupal Ajax Checklist <5.x-1.1 - SQL Injection

Title source: llm
STIX 2.1

Description

Multiple SQL injection vulnerabilities in the ajax_checklist_save function in the Ajax Checklist module 5.x before 5.x-1.1 for Drupal allow remote authenticated users, with "update ajax checklists" permissions, to execute arbitrary SQL commands via a save operation, related to the (1) nid, (2) qid, and (3) state parameters.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Justin C. Klein Keane · textwebappsphp
https://www.exploit-db.com/exploits/32415

References (5)

Core 5
Core References
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/496727/100/0/threaded
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/32009
Patch, Vendor Advisory x_refsource_confirm
http://drupal.org/node/312968
Exploit, Patch vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/31384
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/45410

Scores

EPSS 0.0039
EPSS Percentile 60.3%

Details

CWE
CWE-89
Status published
Products (1)
drupal/ajax_checklist 5.x-1.0
Published Jan 28, 2009
Tracked Since Feb 18, 2026