CVE-2020-37105
Description
PMB 5.6 contains a SQL injection vulnerability in the administration download script that allows authenticated attackers to execute arbitrary SQL commands through the 'logid' parameter. Attackers can leverage this vulnerability by sending crafted requests to the /admin/sauvegarde/download.php endpoint with manipulated logid values to interact with the database.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
PMB 5.6 SQL injection in /admin/sauvegarde/download.php via logid parameter allows authenticated attackers to execute arbitrary SQL commands.
Vulnerability
Description
CVE-2020-37105 is a SQL injection vulnerability in PMB version 5.6 and earlier. The flaw resides in the administration download script at /admin/sauvegarde/download.php, where the logid parameter is not properly sanitized before being used in SQL queries. This allows an authenticated attacker with administration privileges to inject arbitrary SQL commands [1][3].
Exploitation
To exploit the vulnerability, an attacker must be authenticated with administration-level access to the PMB application. They can then send a crafted HTTP GET request to the vulnerable endpoint, manipulating the logid parameter to inject malicious SQL statements. The exploit is straightforward and can be automated using tools like SQLMap, as demonstrated in public proof-of-concept code [3].
Impact
Successful exploitation allows an attacker to execute arbitrary SQL commands against the underlying database. This can lead to extraction of sensitive data, such as user credentials, bibliographic records, and other stored information. The attacker could also modify or delete database content, potentially compromising the integrity and availability of the library management system [4].
Mitigation
According to the vendor, PMB 5.6 is an older release, and the vulnerability has been addressed in later versions. Users are strongly advised to upgrade to the latest stable release of PMB, such as version 8.0.1 or later, which includes security fixes [1]. There is no known workaround for this vulnerability other than upgrading.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: = 5.6
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.