vendor:
dotProject
by:
sherl0ck_
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: dotProject
Affected Version From: 2.1.2005
Affected Version To: 2.1.2005
Patch Exists: YES
Related CWE: N/A
CPE: a:dotproject:dotproject:2.1.5
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Debian GNU/Linux 5.0
2011
dotProject 2.1.5 SQL Injection Vulnerability
An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. The vulnerable code is located in the modules/ticketsmith/view.php file, where the user-supplied input is not properly sanitized before being used in a SQL query. This can be exploited to manipulate the SQL query by injecting arbitrary SQL code. The vulnerable code is located in the modules/ticketsmith/common.inc.php file, where the user-supplied input is not properly sanitized before being used in a SQL query. This can be exploited to manipulate the SQL query by injecting arbitrary SQL code.
Mitigation:
Input validation should be used to ensure that untrusted data is not used to construct SQL queries that are executed against the database. Additionally, parameterized queries should be used to prevent SQL injection attacks.