CVE-2009-0597

w3b>cms <3.4.0 - SQL Injection

Title source: llm
STIX 2.1

Description

SQL injection vulnerability in admin/index.php in w3b>cms (aka w3blabor CMS) before 3.4.0, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the benutzername parameter (aka Username field) in a login action.

Exploits (1)

exploitdb WORKING POC VERIFIED
by DNX · textwebappsphp
https://www.exploit-db.com/exploits/7640

References (5)

Core 5
Core References
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/33364
Exploit, Patch vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/33082
Vendor Advisory x_refsource_misc
http://forum.w3bcms.de/viewtopic.php?f=5&t=256
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/51108
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/7640

Scores

EPSS 0.0030
EPSS Percentile 53.1%

Details

CWE
CWE-89
Status published
Products (1)
w3b_cms/aka_w3blabor_cms < 3.3.0
Published Feb 16, 2009
Tracked Since Feb 18, 2026