First published: Wed Apr 30 2008(Updated: )
SQL injection vulnerability in index.php in the PostSchedule 1.0 module for PostNuke allows remote attackers to execute arbitrary SQL commands via the eid parameter in an event action.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Postnuke Software Foundation Postschedule | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2008-2012 is considered high due to the potential for remote attackers to execute arbitrary SQL commands.
To fix CVE-2008-2012, it is recommended to update to the latest version of the PostSchedule module or apply proper input validation to sanitize the eid parameter.
CVE-2008-2012 affects version 1.0 of the PostSchedule module for PostNuke.
CVE-2008-2012 is categorized as an SQL injection vulnerability.
Yes, CVE-2008-2012 can be exploited by remote attackers without requiring authentication.