Intrusion Prevention

TextPattern.CMS.URI.QTY.SQL.Injection

Description

This indicates an attack attempt to exploit a SQL Injection vulnerability in TextPattern CMS.
The vulnerability is due to insufficient sanitizing of user supplied inputs in the application when handling a craft HTTP request. A remote attacker can exploit this to send a crafted query to execute SQL commands on a vulnerable server.

Affected Products

Textpattern CMS 4.6.2 and prior

Impact

System Compromise: Remote attackers can access or modify data in the database of the affected application

Recommended Actions

Currently we are unaware of any vendor supplied patch for this issue

CVE References

CVE-2018-7474

Other References

44277