7.5
CVE-2020-8596
- EPSS 1.31%
- Veröffentlicht 11.02.2020 12:15:21
- Zuletzt bearbeitet 21.11.2024 05:39:05
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
Participants Database <= 1.9.5.5 - SQL Injection
participants-database.php in the Participants Database plugin 1.9.5.5 and previous versions for WordPress has a time-based SQL injection vulnerability via the ascdesc, list_filter_count, or sortBy parameters. It is possible to exfiltrate data and potentially execute code (if certain conditions are met).
Mögliche Gegenmaßnahme
Participants Database: Update to version 1.9.5.6, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
Participants Database
Version
[*, 1.9.5.6)
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Xnau ≫ Participants Database SwPlatformwordpress Version <= 1.9.5.5
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 1.31% | 0.792 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.5 | 1.6 | 5.9 |
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
|
| nvd@nist.gov | 6 | 6.8 | 6.4 |
AV:N/AC:M/Au:S/C:P/I:P/A:P
|
CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.