vendor:
ProjectSend r561
by:
Le Ngoc Phi & ITAS Team
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: ProjectSend r561
Affected Version From: ProjectSend r561
Affected Version To: ProjectSend r561
Patch Exists: NO
Related CWE: N/A
CPE: a:projectsend:projectsend:r561
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2015
ProjectSend r561 – SQL injection vulnerability
ProjectSend r561 is vulnerable to SQL injection. An attacker can exploit this vulnerability to gain access to the database and execute arbitrary SQL commands. The vulnerable code is located in the client-edit.php file, where the user-supplied input is not properly sanitized before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
Mitigation:
Input validation should be used to ensure that untrusted data is not used to construct SQL queries in an unsafe manner. All user-supplied input should be validated and filtered before being used in a SQL query.