Description
SQL injection vulnerability in ask_chat.php in eFront 3.6.2 and earlier allows remote attackers to execute arbitrary SQL commands via the chatrooms_ID parameter.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Stefan Esser · textwebappsphp
https://www.exploit-db.com/exploits/33969
References (6)
Core 6
Core References
Vendor Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2010/1101
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/39728
Exploit x_refsource_misc
http://packetstormsecurity.org/1005-exploits/MOPS-2010-018.pdf
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/40032
Exploit x_refsource_misc
http://www.php-security.org/2010/05/09/mops-2010-018-efront-ask_chat-chatrooms_id-sql-injection-vulnerability/index.html
Exploit vdb-entry
x_refsource_osvdb
http://osvdb.org/64506
Scores
EPSS
0.0114
EPSS Percentile
78.5%
Details
CWE
CWE-89
Status
published
Products (13)
efrontlearning/efront
3.1.0
efrontlearning/efront
3.1.2
efrontlearning/efront
3.1.3
efrontlearning/efront
3.1.4
efrontlearning/efront
3.5.0 (5 CPE variants)
efrontlearning/efront
3.5.1
efrontlearning/efront
3.5.2
efrontlearning/efront
3.5.3
efrontlearning/efront
3.5.4
efrontlearning/efront
3.5.5
... and 3 more
Published
May 12, 2010
Tracked Since
Feb 18, 2026