CVE-2009-0965

Loading...

General

Score:7.5/10.0
Severity:High
Category:SQL Injection
Exploit:Available

Impact Metrics

Confidentiality:Partial
Integrity:Partial
Availability:Partial

Exploitability Metrics

Access Vector:Network
Access Complexity:Low
Authentication:None

Published on 19/03/09 - Updated on 29/09/17

Description

SQL injection vulnerability in functions/browse.php in Ganesha Digital Library (GDL) 4.0 and 4.2 allows remote attackers to execute arbitrary SQL commands via the node parameter in a browse action to gdl.php.

Category: SQL Injection

CWE-89 (SQL Injection)
The software constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component.

Security Notices

US National Vulnerability DatabaseCVE-2009-0965

Exploits

Exploit-DBEDB-8228
SecurityFocusBID-34144

Relative technologies

VendorProduct
ismail_fahmiganesha_digital_library

Share this vulnerability with:

Twitter Facebook LinkedIn Mail