A SQL injection vulnerability in license_update.php in Mumara Classic through 2.93 allows a remote unauthenticated attacker to execute arbitrary SQL commands via the license parameter.
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.
Link | Tags |
---|---|
https://www.mumara.com/classic/ | product |
https://packetstormsecurity.com/files/164947/Mumara-Classic-2.93-SQL-Injection.html | exploit vdb entry third party advisory |
https://www.exploit-db.com/exploits/50518 | exploit vdb entry third party advisory |
https://packetstormsecurity.com/files/164947/mumaraclassic293-sql.txt | exploit vdb entry third party advisory |
https://www.cyberdetails.org/2021/11/mumara-classic-293-sql-injection.html | third party advisory exploit |
https://vulners.com/zdt/1337DAY-ID-37036 | third party advisory exploit |
https://www.gen.net.uk/about-us/news/50-exploit-db/18335-webapps-mumara-classic-293-license-sql-injection-unauthenticated | third party advisory exploit |
https://www.linkedin.com/posts/shain-lakin_mumara-classic-293-license-sql-injection-activity-6867380934908506112-dAJd | third party advisory exploit |
https://cxsecurity.com/issue/WLB-2021110057 | third party advisory exploit |