Published on April 21st, 2019 📆 | 3599 Views ⚑0
ROCBOSS 2.2.1 POST Request PostController.php doReward score sql injection
|CVSS Meta Temp Score||Current Exploit Price (≈)|
A vulnerability classified as critical has been found in ROCBOSS 2.2.1. Affected is the function
doReward of the file app/controllers/frontend/PostController.php of the component POST Request Handler. The manipulation of the argument
score with an unknown input leads to a sql injection vulnerability. CWE is classifying the issue as CWE-89. This is going to have an impact on confidentiality, integrity, and availability. An attacker might be able inject and/or alter existing SQL statements which would influence the database exchange.
The weakness was shared 04/20/2019. This vulnerability is traded as CVE-2019-11362 since 04/20/2019. It is possible to launch the attack remotely. There are known technical details, but no exploit is available. The current price for an exploit might be approx. USD $0-$5k (estimation calculated on 04/21/2019).
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
VulDB Meta Base Score: 6.3
VulDB Meta Temp Score: 6.3
Status: Not defined
Price Prediction: ?
Current Price Estimation: ?
Threat: ? Check our Alexa App!
Remediation: ?Recommended: no mitigation known
0-Day Time: ?04/20/2019 Advisory disclosed
04/20/2019 +0 days CVE assigned
04/21/2019 +1 days VulDB entry created
04/21/2019 +0 days VulDB last updateCVE: CVE-2019-11362 (?)Created: 04/21/2019 08:28 AM
Check our Alexa App!