phpBugTracker Input Validation Vulnerabilities
Multiple input validation vulnerabilities in phpBugTracker allow remote attackers to execute arbitrary SQL commands via (1) the bugid parameter in bug.php?op=show, (2) the bugid parameter in bug.php?op=vote, (3) the bugid parameter in bug.php?op=viewvotes, or (4) the project parameter in bug.php?op=add, which are not properly sanitized before being used in SQL queries. This can lead to unauthorized access to sensitive information, corruption of database data, and exploitation of underlying database vulnerabilities. Additionally, phpBugTracker is prone to cross-site scripting (XSS) and HTML injection issues, which enable attackers to execute arbitrary script code in the browser of unsuspecting users. This can result in the theft of authentication credentials and other sensitive information.