EGavilan Media EGM Address Book 1.0 contains a SQL injection vulnerability. An attacker can gain Admin Panel access using malicious SQL injection queries to perform remote arbitrary code execution.
References
| Link | Resource |
|---|---|
| https://systemweakness.com/cve-2020-29474-egavilanmedia-address-book-1-0-exploit-sqli-auth-bypass-228cd4864262 | Exploit Third Party Advisory |
| https://www.exploit-db.com/exploits/49182 | Exploit Third Party Advisory VDB Entry |
| https://systemweakness.com/cve-2020-29474-egavilanmedia-address-book-1-0-exploit-sqli-auth-bypass-228cd4864262 | Exploit Third Party Advisory |
| https://www.exploit-db.com/exploits/49182 | Exploit Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 05:24
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://systemweakness.com/cve-2020-29474-egavilanmedia-address-book-1-0-exploit-sqli-auth-bypass-228cd4864262 - Exploit, Third Party Advisory | |
| References | () https://www.exploit-db.com/exploits/49182 - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2020-12-24 20:15
Updated : 2024-11-21 05:24
NVD link : CVE-2020-29474
Mitre link : CVE-2020-29474
CVE.ORG link : CVE-2020-29474
JSON object : View
Products Affected
egavilanmedia
- egm_address_book
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
