An issue was discovered in phpList through 3.5.4. An error-based SQL Injection vulnerability exists via the Import Administrators section.
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.
Link | Tags |
---|---|
https://www.phplist.org/newslist/phplist-3-5-5-release-notes/ | release notes vendor advisory |
https://discuss.phplist.org/t/phplist-3-5-5-has-been-released/6377 | release notes vendor advisory |
https://blog.telspace.co.za/2020/07/phplist-cve-2020-15072-cve-2020-15073.html | third party advisory exploit |