Description
SQL injection vulnerability in mod1/index.php in the Akronymmanager (sb_akronymmanager) extension before 7.0.0 for TYPO3 allows remote authenticated users with permission to maintain acronyms to execute arbitrary SQL commands via the id parameter.
Exploits (1)
References (7)
Core 7
Core References
Patch x_refsource_confirm
http://typo3.org/extensions/repository/view/sb_akronymmanager
Exploit x_refsource_misc
http://packetstormsecurity.com/files/132302/TYPO3-Extension-Akronymmanager-0.5.0-SQL-Injection.html
Exploit mailing-list
x_refsource_fulldisc
http://seclists.org/fulldisclosure/2015/Jun/43
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/75191
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/535765/100/0/threaded
Exploit exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/37301/
Exploit x_refsource_misc
https://www.redteam-pentesting.de/advisories/rt-sa-2015-002
Scores
EPSS
0.0429
EPSS Percentile
88.9%
Details
CWE
CWE-89
Status
published
Products (1)
akronymmanager_project/akronymmanager
< 0.5.0
Published
Jun 17, 2015
Tracked Since
Feb 18, 2026