#VU41402 SQL injection in TestLink - CVE-2012-0938
Published: August 14, 2014 / Updated: August 11, 2020
TestLink
testlink.org
Description
The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.
The vulnerability exists due to insufficient sanitization of user-supplied data passed via the root_node parameter in the display_children function to (1) getrequirementnodes.php or (2) gettprojectnodes.php in lib/ajax/; the (3) cfield_id parameter in an edit action to lib/cfields/cfieldsEdit.php; the (4) id parameter in an edit action or (5) plan_id parameter in a create action to lib/plan/planMilestonesEdit.php; or the req_spec_id parameter to (6) reqImport.php or (7) in a create action to reqEdit.php in lib/requirements/. NOTE: some of these details are obtained from third party information. A remote attacker can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.
Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.
Remediation
External links
- http://archives.neohapsis.com/archives/bugtraq/2012-02/0104.html
- http://osvdb.org/79450
- http://osvdb.org/79451
- http://osvdb.org/79452
- http://osvdb.org/79453
- http://osvdb.org/79454
- http://secunia.com/advisories/48054
- http://www.securityfocus.com/bid/52086
- https://exchange.xforce.ibmcloud.com/vulnerabilities/73327