Admidio is a free, open source user management system for websites of organizations and groups. In Admidio before version 4.3.9, there is an SQL Injection in the `/adm_program/modules/ecards/ecard_send.php` source file of the Admidio Application. The SQL Injection results in a compromise of the application's database. The value of `ecard_recipients `POST parameter is being directly concatenated with the SQL query in the source code causing the SQL Injection. The SQL Injection can be exploited by a member user, using blind condition-based, time-based, and Out of band interaction SQL Injection payloads. This vulnerability is fixed in 4.3.9.
References
Configurations
History
21 Nov 2024, 09:24
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-89 | |
References | () https://github.com/Admidio/admidio/commit/3ff02b0c64a6911ab3e81cd61077f392c0b25248 - Patch | |
References | () https://github.com/Admidio/admidio/security/advisories/GHSA-69wx-xc6j-28v3 - Exploit, Vendor Advisory | |
CPE | cpe:2.3:a:admidio:admidio:*:*:*:*:*:*:*:* | |
First Time |
Admidio
Admidio admidio |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
29 Jul 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-29 15:15
Updated : 2024-11-21 09:24
NVD link : CVE-2024-37906
Mitre link : CVE-2024-37906
JSON object : View
Products Affected
admidio
- admidio
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')