First published: Fri Jan 08 2021(Updated: )
Invision Community IPS Community Suite before 4.5.4.2 allows SQL Injection via the Downloads REST API (the sortDir parameter in a sortBy=popular action to the GETindex() method in applications/downloads/api/files.php).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Invisioncommunity Ips Community Suite | <4.5.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3025 is a vulnerability in Invision Community IPS Community Suite before 4.5.4.2 that allows SQL Injection via the Downloads REST API.
The vulnerability occurs due to improper handling of the sortDir parameter in a sortBy=popular action to the GETindex() method in applications/downloads/api/files.php.
The severity of CVE-2021-3025 is high, with a CVSS score of 8.8.
Yes, a fix is available for CVE-2021-3025 by updating to Invision Community IPS Community Suite version 4.5.4.2 or later.
Additional references for CVE-2021-3025 can be found at http://packetstormsecurity.com/files/160830/IPS-Community-Suite-4.5.4-SQL-Injection.html and https://invisioncommunity.com/release-notes/.