USOC is an open source CMS with a focus on simplicity. In affected versions USOC allows for SQL injection via register.php. In particular usernames, email addresses, and passwords provided by the user were not sanitized and were used directly to construct a sql statement. Users are advised to upgrade as soon as possible. There are not workarounds for this issue.
References
Link | Resource |
---|---|
https://github.com/Aaron-Junker/USOC/commit/21e8bfd7a9ab0b7f9344a7a3a7c32a7cdd5a0b69 | Patch Third Party Advisory |
https://github.com/Aaron-Junker/USOC/security/advisories/GHSA-fjp4-phjh-jgmc | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2022-01-04 20:15
Updated : 2022-01-21 14:24
NVD link : CVE-2022-21643
Mitre link : CVE-2022-21643
CVE.ORG link : CVE-2022-21643
JSON object : View
Products Affected
useful_simple_open-source_cms_project
- useful_simple_open-source_cms
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')