CVE-2022-4871

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-4871
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-4871.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-4871
Published
2023-01-03T12:15:10Z
Modified
2025-07-02T00:23:00.815281Z
Severity
  • 7.2 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A vulnerability classified as problematic was found in ummmmm nflpick-em.com up to 2.2.x. This vulnerability affects the function LoadUsers of the file html/includes/runtime/admin/JSON/LoadUsers.php. The manipulation of the argument sort leads to sql injection. The attack can be initiated remotely. The patch is identified as dd77a35942f527ea0beef5e0ec62b92e8b93211e. It is recommended to apply a patch to fix this issue. VDB-217270 is the identifier assigned to this vulnerability. NOTE: JSON entrypoint is only accessible via an admin account

References

Affected packages

Git / github.com/ummmmm/nflpick-em.com

Affected ranges

Type
GIT
Repo
https://github.com/ummmmm/nflpick-em.com
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v1.*

v1.0.0
v1.1.0
v1.2.0
v1.2.1
v1.2.2
v1.3.0

v2.*

v2.0.0
v2.1.0
v2.1.1
v2.2.0
v2.2.1
v2.2.2
v2.2.3