A vulnerability, which was classified as critical, was found in Gimmie Plugin 1.2.2 on vBulletin. Affected is an unknown function of the file trigger_ratethread.php. The manipulation of the argument t/postusername leads to sql injection. Upgrading to version 1.3.0 is able to address this issue. The patch is identified as f11a136e9cbd24997354965178728dc22a2aa2ed. It is recommended to upgrade the affected component. VDB-220206 is the identifier assigned to this vulnerability.
References
Link | Resource |
---|---|
https://github.com/gimmie/vbulletin-v4/commit/f11a136e9cbd24997354965178728dc22a2aa2ed | Patch Third Party Advisory |
https://github.com/gimmie/vbulletin-v4/tree/v1.3.0 | Release Notes Third Party Advisory |
https://vuldb.com/?ctiid.220206 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.220206 | Permissions Required Third Party Advisory |
https://github.com/gimmie/vbulletin-v4/commit/f11a136e9cbd24997354965178728dc22a2aa2ed | Patch Third Party Advisory |
https://github.com/gimmie/vbulletin-v4/tree/v1.3.0 | Release Notes Third Party Advisory |
https://vuldb.com/?ctiid.220206 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.220206 | Permissions Required Third Party Advisory |
Configurations
History
No history.
Information
Published : 2023-02-06 00:15
Updated : 2024-11-21 02:03
NVD link : CVE-2014-125085
Mitre link : CVE-2014-125085
CVE.ORG link : CVE-2014-125085
JSON object : View
Products Affected
gimmie_project
- gimmie
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')