SQL injection in PHP - CVE-2012-0831
Published: February 10, 2012 / Updated: August 11, 2020
PHP
Detailed vulnerability description
The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.
The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.
Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.
How to mitigate CVE-2012-0831
Sources
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080037.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080041.html
- http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00001.html
- http://rhn.redhat.com/errata/RHSA-2013-1307.html
- http://secunia.com/advisories/48668
- http://secunia.com/advisories/55078
- http://support.apple.com/kb/HT5501
- http://svn.php.net/viewvc?view=revision&revision=323016
- http://www.securityfocus.com/bid/51954
- http://www.ubuntu.com/usn/USN-1358-1
- https://exchange.xforce.ibmcloud.com/vulnerabilities/73125
- https://launchpadlibrarian.net/92454212/php5_5.3.2-1ubuntu4.13.diff.gz