{ "schema_version": "1.4.0", "id": "GHSA-xg97-vmg6-hhf5", "modified": "2022-05-24T17:47:43Z", "published": "2022-05-24T17:47:43Z", "aliases": [ "CVE-2021-28242" ], "details": "SQL Injection in the \"evoadm.php\" component of b2evolution v7.2.2-stable allows remote attackers to obtain sensitive database information by injecting SQL commands into the \"cf_name\" parameter when creating a new filter under the \"Collections\" tab.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28242" }, { "type": "WEB", "url": "https://github.com/b2evolution/b2evolution/issues/109" }, { "type": "WEB", "url": "https://deadsh0t.medium.com/authenticated-boolean-based-blind-error-based-sql-injection-b752225f0644" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/162489/b2evolution-7-2-2-SQL-Injection.html" } ], "database_specific": { "cwe_ids": [ "CWE-77", "CWE-89" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2021-04-15T14:15:00Z" } }