CVE-2015-7568

SQL injection vulnerability in the password recovery feature in Yeager CMS 1.2.1 allows remote attackers to change the account credentials of known users via the "userEmail" parameter.
References
Link Resource
http://packetstormsecurity.com/files/135716/Yeager-CMS-1.2.1-File-Upload-SQL-Injection-XSS-SSRF.html Exploit Patch Third Party Advisory VDB Entry
http://seclists.org/fulldisclosure/2016/Feb/44 Mailing List Patch Third Party Advisory
http://www.securityfocus.com/archive/1/537493/100/0/threaded Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/39436/ Exploit Patch Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/135716/Yeager-CMS-1.2.1-File-Upload-SQL-Injection-XSS-SSRF.html Exploit Patch Third Party Advisory VDB Entry
http://seclists.org/fulldisclosure/2016/Feb/44 Mailing List Patch Third Party Advisory
http://www.securityfocus.com/archive/1/537493/100/0/threaded Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/39436/ Exploit Patch Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:yeager:yeager_cms:1.2.1:*:*:*:*:*:*:*

History

No history.

Information

Published : 2017-04-24 18:59

Updated : 2025-04-20 01:37


NVD link : CVE-2015-7568

Mitre link : CVE-2015-7568

CVE.ORG link : CVE-2015-7568


JSON object : View

Products Affected

yeager

  • yeager_cms
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')