First published: Wed Oct 05 2011(Updated: )
SQL injection vulnerability in asearch.php in webSPELL 4.2.1 allows remote attackers to execute arbitrary SQL commands via the search parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Webspell | =4.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-4861 is rated as a high severity vulnerability due to its potential to allow arbitrary SQL command execution.
To fix CVE-2010-4861, you should update webSPELL to version 4.2.2 or later which addresses this vulnerability.
CVE-2010-4861 is classified as an SQL injection vulnerability affecting the asearch.php file in webSPELL.
CVE-2010-4861 affects all users of webSPELL version 4.2.1.
Yes, CVE-2010-4861 can be exploited remotely by attackers via the search parameter.