The upsql function in \Lib\Lib\Action\Admin\DataAction.class.php in Gxlcms QY v1.0.0713 allows remote attackers to execute arbitrary SQL statements via the sql parameter. Consequently, an attacker can execute arbitrary PHP code by placing it after a <?php substring, and then using INTO OUTFILE with a .php filename.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T07:17:52.338Z
Reserved: 2018-04-03T00:00:00
Link: CVE-2018-9247

No data.

Status : Modified
Published: 2018-04-04T00:29:00.277
Modified: 2024-11-21T04:15:12.640
Link: CVE-2018-9247

No data.

No data.