A vulnerability was found in PHP-Login 1.0. It has been declared as critical. This vulnerability affects the function checkLogin of the file login/scripts/class.loginscript.php of the component POST Parameter Handler. The manipulation of the argument myusername leads to sql injection. The attack can be initiated remotely. Upgrading to version 2.0 is able to address this issue. The patch is identified as 0083ec652786ddbb81335ea20da590df40035679. It is recommended to upgrade the affected component. VDB-228022 is the identifier assigned to this vulnerability.
References
Link | Resource |
---|---|
https://github.com/ipoelnet/php-login/commit/0083ec652786ddbb81335ea20da590df40035679 | Patch |
https://github.com/ipoelnet/php-login/releases/tag/v2.0 | Release Notes |
https://vuldb.com/?ctiid.228022 | Third Party Advisory |
https://vuldb.com/?id.228022 | Third Party Advisory |
https://github.com/ipoelnet/php-login/commit/0083ec652786ddbb81335ea20da590df40035679 | Patch |
https://github.com/ipoelnet/php-login/releases/tag/v2.0 | Release Notes |
https://vuldb.com/?ctiid.228022 | Third Party Advisory |
https://vuldb.com/?id.228022 | Third Party Advisory |
Configurations
History
21 Nov 2024, 02:45
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 7.3 |
References | () https://github.com/ipoelnet/php-login/commit/0083ec652786ddbb81335ea20da590df40035679 - Patch | |
References | () https://github.com/ipoelnet/php-login/releases/tag/v2.0 - Release Notes | |
References | () https://vuldb.com/?ctiid.228022 - Third Party Advisory | |
References | () https://vuldb.com/?id.228022 - Third Party Advisory |
07 Nov 2023, 02:29
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-89 |
20 Oct 2023, 12:15
Type | Values Removed | Values Added |
---|---|---|
Summary | A vulnerability was found in PHP-Login 1.0. It has been declared as critical. This vulnerability affects the function checkLogin of the file login/scripts/class.loginscript.php of the component POST Parameter Handler. The manipulation of the argument myusername leads to sql injection. The attack can be initiated remotely. Upgrading to version 2.0 is able to address this issue. The patch is identified as 0083ec652786ddbb81335ea20da590df40035679. It is recommended to upgrade the affected component. VDB-228022 is the identifier assigned to this vulnerability. | |
CWE |
12 May 2023, 16:22
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://github.com/ipoelnet/php-login/commit/0083ec652786ddbb81335ea20da590df40035679 - Patch | |
References | (MISC) https://vuldb.com/?id.228022 - Third Party Advisory | |
References | (MISC) https://vuldb.com/?ctiid.228022 - Third Party Advisory | |
References | (MISC) https://github.com/ipoelnet/php-login/releases/tag/v2.0 - Release Notes | |
First Time |
Php-login Project
Php-login Project php-login |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CPE | cpe:2.3:a:php-login_project:php-login:1.0:*:*:*:*:*:*:* |
06 May 2023, 01:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-05-06 01:15
Updated : 2024-11-21 02:45
NVD link : CVE-2016-15031
Mitre link : CVE-2016-15031
CVE.ORG link : CVE-2016-15031
JSON object : View
Products Affected
php-login_project
- php-login
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')