CVE-2017-20128

HIGH

KB Messages PHP Script 1.0 - SQL Injection

Title source: llm
STIX 2.1

Description

A vulnerability has been found in KB Messages PHP Script 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality. The manipulation of the argument username/password with the input 'or''=' leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

Exploits (1)

exploitdb WORKING POC
by Ihsan Sencan · textwebappsphp
https://www.exploit-db.com/exploits/41168

References (2)

Core 2
Core References
Exploit, Third Party Advisory, VDB Entry x_refsource_misc
https://www.exploit-db.com/exploits/41168/
Permissions Required, Third Party Advisory x_refsource_misc
https://vuldb.com/?id.96619

Scores

CVSS v3 7.3
EPSS 0.0033
EPSS Percentile 55.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact partial

Details

CWE
CWE-89
Status published
Products (1)
kb_messages_php_script_project/kb_messages_php_script 1.0
Published Jul 13, 2022
Tracked Since Feb 18, 2026