{"id":"CVE-2017-5345","details":"SQL injection vulnerability in inc/lib/Control/Ajax/tags-ajax.control.php in GeniXCMS 0.0.8 allows remote authenticated editors to execute arbitrary SQL commands via the term parameter to the default URI.","modified":"2026-04-11T18:29:53.894462Z","published":"2017-01-12T06:59:00.360Z","references":[{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/95660"},{"type":"FIX","url":"https://github.com/semplon/GeniXCMS/commit/6e21c01d87672d81080450e6913e0093a02bfab8"},{"type":"FIX","url":"https://github.com/semplon/GeniXCMS/issues/60"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/GeniXCMS/GeniXCMS","events":[{"introduced":"0"},{"last_affected":"c0809a1d7056e9703e0bbe506e0e9365bcc35cad"}],"database_specific":{"cpe":"cpe:2.3:a:metalgenix:genixcms:0.0.8:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"last_affected":"0.0.8"}]}}],"versions":["v0.0.1","v0.0.2","v0.0.3","v0.0.3-patch","v0.0.4","v0.0.4-patch","v0.0.5","v0.0.6","v0.0.7","v0.0.7-alpha","v0.0.7-alpha.1","v0.0.8"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-5345.json"}},{"ranges":[{"type":"GIT","repo":"https://github.com/genixcms/genixcms","events":[{"introduced":"0"},{"fixed":"6e21c01d87672d81080450e6913e0093a02bfab8"}],"database_specific":{"source":"REFERENCES"}}],"versions":["v0.0.1","v0.0.2","v0.0.3","v0.0.3-patch","v0.0.4","v0.0.4-patch","v0.0.5","v0.0.6","v0.0.7","v0.0.7-alpha","v0.0.7-alpha.1","v0.0.8"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-5345.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}