CVE-2015-2843
Goautodial Goadmin CE - SQL Injection
Title source: ruleDescription
Multiple SQL injection vulnerabilities in GoAutoDial GoAdmin CE before 3.3-1421902800 allow remote attackers to execute arbitrary SQL commands via the (1) user_name or (2) user_pass parameter in go_login.php or the PATH_INFO to (3) go_login/validate_credentials/admin/ or (4) index.php/go_site/go_get_user_info/.
Exploits (3)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremoteunix
https://www.exploit-db.com/exploits/42296
exploitdb
WORKING POC
VERIFIED
by Chris McCurley · textwebappsphp
https://www.exploit-db.com/exploits/36807
metasploit
WORKING POC
EXCELLENT
by Chris McCurley · rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/goautodial_3_rce_command_injection.rb
References (6)
Scores
EPSS
0.8005
EPSS Percentile
99.1%
Details
CWE
CWE-89
Status
published
Products (2)
goautodial/goadmin_ce
3.0
goautodial/goadmin_ce
3.3
Published
May 12, 2015
Tracked Since
Feb 18, 2026