CVE-2016-15031

A vulnerability was found in PHP-Login 1.0. It has been declared as critical. This vulnerability affects the function checkLogin of the file login/scripts/class.loginscript.php of the component POST Parameter Handler. The manipulation of the argument myusername leads to sql injection. The attack can be initiated remotely. Upgrading to version 2.0 is able to address this issue. The patch is identified as 0083ec652786ddbb81335ea20da590df40035679. It is recommended to upgrade the affected component. VDB-228022 is the identifier assigned to this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:php-login_project:php-login:1.0:*:*:*:*:*:*:*

History

21 Nov 2024, 02:45

Type Values Removed Values Added
References () https://github.com/ipoelnet/php-login/commit/0083ec652786ddbb81335ea20da590df40035679 - Patch () https://github.com/ipoelnet/php-login/commit/0083ec652786ddbb81335ea20da590df40035679 - Patch
References () https://github.com/ipoelnet/php-login/releases/tag/v2.0 - Release Notes () https://github.com/ipoelnet/php-login/releases/tag/v2.0 - Release Notes
References () https://vuldb.com/?ctiid.228022 - Third Party Advisory () https://vuldb.com/?ctiid.228022 - Third Party Advisory
References () https://vuldb.com/?id.228022 - Third Party Advisory () https://vuldb.com/?id.228022 - Third Party Advisory
CVSS v2 : 7.5
v3 : 9.8
v2 : 7.5
v3 : 7.3

Information

Published : 2023-05-06 01:15

Updated : 2024-11-21 02:45


NVD link : CVE-2016-15031

Mitre link : CVE-2016-15031

CVE.ORG link : CVE-2016-15031


JSON object : View

Products Affected

php-login_project

  • php-login
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')