Multiple SQL injection vulnerabilities in Muviko 1.1 allow remote attackers to execute arbitrary SQL commands via the (1) email parameter to login.php; the (2) season_id parameter to themes/flixer/ajax/load_season.php; the (3) movie_id parameter to themes/flixer/ajax/get_rating.php; the (4) rating or (5) movie_id parameter to themes/flixer/ajax/update_rating.php; or the (6) id parameter to themes/flixer/ajax/set_player_source.php.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/145834/Muviko-1.1-SQL-Injection.html | Exploit Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/43477/ | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/145834/Muviko-1.1-SQL-Injection.html | Exploit Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/43477/ | Exploit Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 03:19
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/145834/Muviko-1.1-SQL-Injection.html - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.exploit-db.com/exploits/43477/ - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2018-01-12 17:29
Updated : 2024-11-21 03:19
NVD link : CVE-2017-17970
Mitre link : CVE-2017-17970
CVE.ORG link : CVE-2017-17970
JSON object : View
Products Affected
muvikoscript
- muviko
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')