ID

VAR-201102-0502


TITLE

Pragyan CMS SQL Injection and PHP Code Execution Vulnerabilities

Trust: 0.3

sources: BID: 46573

DESCRIPTION

Pragyan CMS is prone to an SQL-injection vulnerability and a code-execution vulnerability because it fails to sufficiently sanitize user-supplied data. Successfully exploiting these issues may allow an attacker to compromise the application, access or modify data, exploit latent vulnerabilities in the underlying database, or execute arbitrary PHP code in the context of the application. Pragyan CMS 3.0 rev 274 is vulnerable; other versions may be affected.

Trust: 0.3

sources: BID: 46573

AFFECTED PRODUCTS

vendor:pragyanmodel:cms pragyan cms revscope:eqversion:3.0274

Trust: 0.3

vendor:pragyanmodel:cms pragyan cmsscope:eqversion:3.0

Trust: 0.3

sources: BID: 46573

THREAT TYPE

network

Trust: 0.3

sources: BID: 46573

TYPE

Input Validation Error

Trust: 0.3

sources: BID: 46573

EXTERNAL IDS

db:BIDid:46573

Trust: 0.3

sources: BID: 46573

REFERENCES

url:http://bugix-security.blogspot.com/2011/02/pragyan-cms-multipy-vulnerabilities.html

Trust: 0.3

url:http://sourceforge.net/projects/pragyan/

Trust: 0.3

sources: BID: 46573

CREDITS

Abhishek Lyall

Trust: 0.3

sources: BID: 46573

SOURCES

db:BIDid:46573

LAST UPDATE DATE

2022-05-17T02:09:59.805000+00:00


SOURCES UPDATE DATE

db:BIDid:46573date:2011-02-25T00:00:00

SOURCES RELEASE DATE

db:BIDid:46573date:2011-02-25T00:00:00