#VU40868 SQL injection in ProjectSend - CVE-2015-2564
Published: March 20, 2015 / Updated: November 9, 2020
ProjectSend
ProjectSend
Description
The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.
The vulnerability exists due to insufficient sanitization of user-supplied data passed via the id parameter to users-edit.php. A remote attacker can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.
Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.
Remediation
External links
- http://osvdb.org/show/osvdb/119169
- http://packetstormsecurity.com/files/130691/ProjectSend-r561-SQL-Injection.html
- http://seclists.org/fulldisclosure/2015/Mar/30
- http://www.exploit-db.com/exploits/36303
- http://www.itas.vn/news/itas-team-found-out-a-SQL-Injection-vulnerability-in-projectsend-r561-76.html
- http://www.securityfocus.com/archive/1/534832/100/0/threaded