webchess v1.0 was discovered to contain a SQL injection vulnerability via the $playerID parameter at mainmenu.php. NOTE: this is disputed by a third party who indicates that the playerID is a session variable controlled by the server, and thus cannot be used for exploitation.
References
Link | Resource |
---|---|
https://github.com/KLSEHB/vulnerability-report/blob/main/webchess_CVE-2023-39851 | Exploit Third Party Advisory |
https://sourceforge.net/projects/webchess | Product |
Configurations
History
No history.
Information
Published : 2023-08-15 22:15
Updated : 2024-05-17 02:27
NVD link : CVE-2023-39851
Mitre link : CVE-2023-39851
CVE.ORG link : CVE-2023-39851
JSON object : View
Products Affected
webchess_project
- webchess
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')