6.5
MEDIUM

CVE-2018-19898

Published: 06/12/2018 Updated: 26/12/2018
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8

Vulnerability Summary

ThinkCMF post[id][1] SQL injection

ThinkCMF X2.2.2 has SQL Injection via the method edit_post in ArticleController.class.php and is exploitable by normal authenticated users via the post[id][1] parameter in an article edit_post action.

ThinkCMF is vulnerable to SQL injection. A remote authenticated attacker could send specially-crafted SQL statements to the ArticleController.class.php script using the post[id][1] parameter in an article edit_post action, which could allow the attacker to view, add, modify or delete information in the back-end database.

Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P
Access Complexity: LOW
Authentication: SINGLE
Access Vector: NETWORK
Confidentiality Impact: PARTIAL
Integrity Impact: PARTIAL
Availability Impact: PARTIAL

Vulnerability Trend

Affected Products

Vendor Product Versions
ThinkcmfThinkcmfX2.2.2

References