CVE-2015-2843

Goautodial Goadmin CE - SQL Injection

Title source: rule

Description

Multiple SQL injection vulnerabilities in GoAutoDial GoAdmin CE before 3.3-1421902800 allow remote attackers to execute arbitrary SQL commands via the (1) user_name or (2) user_pass parameter in go_login.php or the PATH_INFO to (3) go_login/validate_credentials/admin/ or (4) index.php/go_site/go_get_user_info/.

Exploits (3)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremoteunix
https://www.exploit-db.com/exploits/42296
exploitdb WORKING POC VERIFIED
by Chris McCurley · textwebappsphp
https://www.exploit-db.com/exploits/36807
metasploit WORKING POC EXCELLENT
by Chris McCurley · rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/goautodial_3_rce_command_injection.rb

Scores

EPSS 0.8005
EPSS Percentile 99.1%

Details

CWE
CWE-89
Status published
Products (2)
goautodial/goadmin_ce 3.0
goautodial/goadmin_ce 3.3
Published May 12, 2015
Tracked Since Feb 18, 2026