Dismissed
Permalink
CVE-2019-25506
8.2 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): LOW
- Availability impact (A): NONE
by @LeSuisse Activity log
- Created automatic suggestion
-
@LeSuisse
removed
3 packages
- python312Packages.freesms
- python313Packages.freesms
- python314Packages.freesms
- @LeSuisse dismissed
FreeSMS 2.1.2 Authentication Bypass via SQL Injection
FreeSMS 2.1.2 contains a boolean-based blind SQL injection vulnerability in the password parameter that allows unauthenticated attackers to bypass authentication by injecting SQL code through the login endpoint. Attackers can exploit the vulnerable password parameter in requests to /pages/crc_handler.php?method=login to authenticate as any known user and subsequently modify their password via the profile update function.
References
- ExploitDB-46658 exploit
- VulnCheck Advisory: FreeSMS 2.1.2 Authentication Bypass via SQL Injection third-party-advisory
Affected products
FreeSMS
- ==2.1.2
Ignored packages (3)
pkgs.python312Packages.freesms
Python interface for Free Mobile SMS API
pkgs.python313Packages.freesms
Python interface for Free Mobile SMS API
pkgs.python314Packages.freesms
Python interface for Free Mobile SMS API