An issue was discovered in Square 9 GlobalForms 6.2.x. A Time Based SQL injection vulnerability in the "match" parameter allows remote authenticated attackers to execute arbitrary SQL commands. It is possible to upgrade access to full server compromise via xp_cmdshell. In some cases, the authentication requirement for the attack can be met by sending the default admin credentials.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| http://seclists.org/fulldisclosure/2018/Mar/57 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T07:02:26.027Z
Reserved: 2018-03-20T00:00:00
Link: CVE-2018-8820
No data.
Status : Modified
Published: 2018-03-28T20:29:00.333
Modified: 2024-11-21T04:14:23.017
Link: CVE-2018-8820
No data.
OpenCVE Enrichment
No data.