vendor:
GIU Gallery Image Upload
by:
Ihsan Sencan
8.8
CVSS
HIGH
SQL Injection
89
CWE
Product Name: GIU Gallery Image Upload
Affected Version From: 0.3.1
Affected Version To: 0.3.1
Patch Exists: NO
Related CWE: N/A
CPE: a:tradesouthwest:giu_gallery_image_upload:0.3.1
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: WiN7_x64/KaLiLinuX_x64
2018
GIU Gallery Image Upload 0.3.1 – ‘category’ SQL Injection
GIU Gallery Image Upload 0.3.1 is vulnerable to a SQL injection vulnerability in the 'category' parameter. An attacker can exploit this vulnerability to gain access to sensitive information from the database, such as usernames and passwords. The vulnerability is due to insufficient sanitization of user-supplied input in the 'category' parameter. An attacker can exploit this vulnerability by sending a specially crafted SQL query to the vulnerable application. This will allow the attacker to gain access to sensitive information from the database.
Mitigation:
Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being used in SQL queries. Additionally, parameterized queries should be used to prevent SQL injection attacks.