TextPattern.CMS.URI.QTY.SQL.Injection

description-logoDescription

This indicates an attack attempt to exploit a SQL Injection vulnerability in TextPattern CMS.
The vulnerability is due to insufficient sanitizing of user supplied inputs in the application when handling a craft HTTP request. A remote attacker can exploit this to send a crafted query to execute SQL commands on a vulnerable server.

affected-products-logoAffected Products

Textpattern CMS 4.6.2 and prior

Impact logoImpact

System Compromise: Remote attackers can access or modify data in the database of the affected application

recomended-action-logoRecommended Actions

Currently we are unaware of any vendor supplied patch for this issue

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2019-11-15 14.725 Default_action:pass:drop
2019-11-06 14.718

References

44277