First published: Wed Apr 04 2018(Updated: )
The upsql function in \Lib\Lib\Action\Admin\DataAction.class.php in Gxlcms QY v1.0.0713 allows remote attackers to execute arbitrary SQL statements via the sql parameter. Consequently, an attacker can execute arbitrary PHP code by placing it after a <?php substring, and then using INTO OUTFILE with a .php filename.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gxlcms | =1.0.0713 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-9247 is considered a critical vulnerability due to its potential for remote code execution.
To fix CVE-2018-9247, upgrade Gxlcms QY to a version that addresses this vulnerability.
CVE-2018-9247 allows remote attackers to execute arbitrary SQL statements and potentially gain remote code execution.
CVE-2018-9247 affects Gxlcms QY version 1.0.0713.
No, CVE-2018-9247 can be exploited without user authentication.