CVE-2009-1812

Collector Mygesuad - SQL Injection

Title source: rule
STIX 2.1

Description

Multiple SQL injection vulnerabilities in myGesuad 0.9.14 (aka 0.9) allow remote attackers to execute arbitrary SQL commands via (1) the formUser parameter (aka the Name field) to common/login.php, and allow remote authenticated users to execute arbitrary SQL commands via the ID parameter in a Detail action to (2) kategorie.php, (3) budget.php, (4) zahlung.php, or (5) adresse.php in modules/, related to classes/class.perform.php.

Exploits (1)

exploitdb WORKING POC VERIFIED
by YEnH4ckEr · textwebappsphp
https://www.exploit-db.com/exploits/8708

References (5)

Core 5
Core References
Third Party Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2009/1345
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/8708
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/35110
Patch, Vendor Advisory x_refsource_confirm
http://www.collector.ch/drupal5/?q=node/39
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/34998

Scores

EPSS 0.0030
EPSS Percentile 53.6%

Details

CWE
CWE-89
Status published
Products (1)
collector/mygesuad 0.9.14
Published May 29, 2009
Tracked Since Feb 18, 2026