A vulnerability was found in PHPList 3.2.6. It has been classified as critical. Affected is an unknown function of the file /lists/admin/ of the component Sending Campain. The manipulation leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.3.1 is able to address this issue. It is recommended to upgrade the affected component.
                
            References
                    | Link | Resource | 
|---|---|
| http://seclists.org/fulldisclosure/2017/Mar/45 | Exploit Mailing List Third Party Advisory | 
| https://vuldb.com/?id.98916 | Third Party Advisory | 
| http://seclists.org/fulldisclosure/2017/Mar/45 | Exploit Mailing List Third Party Advisory | 
| https://vuldb.com/?id.98916 | Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 03:22
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : 6.5
         v3 : 4.7  | 
| References | () http://seclists.org/fulldisclosure/2017/Mar/45 - Exploit, Mailing List, Third Party Advisory | |
| References | () https://vuldb.com/?id.98916 - Third Party Advisory | 
Information
                Published : 2022-06-10 10:15
Updated : 2024-11-21 03:22
NVD link : CVE-2017-20030
Mitre link : CVE-2017-20030
CVE.ORG link : CVE-2017-20030
JSON object : View
Products Affected
                phplist
- phplist
 
CWE
                
                    
                        
                        CWE-89
                        
            Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
