An attacker can exploit these vulnerabilities to inject arbitrary SQL statements into the database and take advantage of database ACLs that permit only certain actions to be taken.
Archery v1.8.0 to v1.8.5 was discovered to contain multiple cross-site scripting vulnerabilities in the Statistics interface. An attacker can exploit these vulnerabilities to inject arbitrary web script or HTML via the start_time and stop_time parameters in the Statistics interface.
Archery v1.8.0 to v1.8.5 was discovered to contain multiple SQL injection vulnerabilities via the start_time and stop_time parameters in the Statistics interface. An attacker can exploit these vulnerabilities to inject arbitrary SQL into the database and take advantage of database ACLs that permit only certain actions to be taken.
Archery v1.7.0 to v1.8.5 was discovered to contain multiple cross-site scripting vulnerabilities in the Statistics interface. An attacker can exploit these vulnerabilities to inject arbitrary web script or HTML via the start_time and stop_time parameters in the Statistics interface.
Archery v1.7.0 to v1.8.5 was discovered to contain multiple SQL injection vulnerabilities via the start_time and stop_time parameters in the Statistics interface. An attacker can exploit these vulnerabilities to inject arbitrary SQL into the database and take advantage of database ACLs that permit only certain actions to be taken.
Archery v1.6.2 to v
The Initial Discovery
The initial discovery of these vulnerabilities in Archery were made on July 29, 2018. The CVEs assigned to the issues are CVE-2022-38541 for multiple cross-site scripting vulnerabilities in the Statistics interface, and CVE-2022-38552 for a SQL injection vulnerability in the same interface. These vulnerabilities have been fixed in Archery v1.7.0 to v1.8.5, which was released on August 28, 2018.
Archery Authentication and Authorization
Archery v1.6.2 to v1.7.0 was discovered to contain multiple cross-site scripting vulnerabilities in the Statistics interface. An attacker can exploit these vulnerabilities to inject arbitrary web script or HTML via the start_time and stop_time parameters in the Statistics interface.
Archery v1.6.2 to v1.7.0 was discovered to contain multiple SQL injection vulnerabilities via the start_time and stop_time parameters in the Statistics interface. An attacker can exploit these vulnerabilities to inject arbitrary SQL into the database and take advantage of database ACLs that permit only certain actions to be taken.
Archery v1.6 to v1.7 was discovered to contain multiple cross-site scripting vulnerabilities in the Statistics interface. An attacker can exploit these vulnerabilities to inject arbitrary web script or HTML via the start_time and stop_time parameters in the Statistics interface.
Archery v1.6 to v1.7 was discovered to contain multiple SQL injection vulnerabilities via the start_time and stop_time parameters in the Statistics interface, which can be exploited for arbitrary SQL injection with database privileges enabled by default on many installations of Archery Database Server software versions from 1 . 6 . 0 . 0 - 1 . 7 . 4 .
Archery Overview
Archery is a flexible, scalable content management system created by Archery Software. It integrates seamlessly with WordPress and includes a variety of powerful features to help you handle your WordPress website’s content.
The Archery CMS is an open-source platform that offers several benefits to its users including the following:
Timeline
Published on: 09/13/2022 15:15:00 UTC
Last modified on: 09/14/2022 22:25:00 UTC