SQL Injection was discovered in Admidio before version 3.3.13. The main cookie parameter is concatenated into a SQL query without any input validation/sanitization, thus an attacker without logging in, can send a GET request with arbitrary SQL queries appended to the cookie parameter and execute SQL queries. The vulnerability impacts the confidentiality of the system. This has been patched in version 3.3.13.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/Admidio/admidio/commit/ea5d6f114b151ed11ec0ad7cb47bd729e77a874a | Patch | 
| https://github.com/Admidio/admidio/issues/908 | Third Party Advisory | 
| https://github.com/Admidio/admidio/security/advisories/GHSA-qh57-rcff-gx54 | Third Party Advisory | 
Configurations
                    History
                    No history.
Information
                Published : 2020-04-24 21:15
Updated : 2020-05-01 19:25
NVD link : CVE-2020-11004
Mitre link : CVE-2020-11004
CVE.ORG link : CVE-2020-11004
JSON object : View
Products Affected
                admidio
- admidio
 
CWE
                
                    
                        
                        CWE-89
                        
            Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
