Zero-day Vulnerability Database

Change view

Zero-day vulnerabilities discovered: 1

SQL injection in PJHome PJBlog3

SQL injection

The vulnerability allows a remote attacker to inject SQL commands on the target system.

The weakness exists in the checkAlias action when processing malformed data passed via "cname" parameter. A remote attacker can send a specially crafted HTTP request to vulnerable script and execute arbitrary SQL queries in web application database..

Successful exploitation of the vulnerability results in compromise of vulnerable system.

Note: this vulnerability was being actively exploited.

Software: PJBlog3