Description
Multiple SQL injection vulnerabilities in MetalGenix GeniXCMS before 0.0.2 allow remote attackers to execute arbitrary SQL commands via the (1) page parameter to index.php or (2) username parameter to gxadmin/login.php.
Exploits (1)
References (10)
Core 10
Core References
Vendor Advisory x_refsource_confirm
http://blog.metalgenix.com/update-security-fix-and-add-newsletter-module/16
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/show/osvdb/119392
Issue Tracking x_refsource_confirm
https://github.com/semplon/GeniXCMS/issues/7
Exploit exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/36321
Patch x_refsource_confirm
https://github.com/semplon/GeniXCMS/commit/698245488343396185b1b49e7482ee5b25541815
Patch x_refsource_confirm
http://blog.metalgenix.com/genixcms-v0-0-2-release-security-and-bug-fixes/17
Exploit x_refsource_misc
http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5232.php
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/73297
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/show/osvdb/119393
Exploit x_refsource_misc
http://packetstormsecurity.com/files/130770/GeniXCMS-0.0.1-SQL-Injection.html
Scores
EPSS
0.0834
EPSS Percentile
92.3%
Details
CWE
CWE-89
Status
published
Products (1)
genixcms/genixcms
< 0.0.1
Published
Mar 23, 2015
Tracked Since
Feb 18, 2026