vendor:
phpGedView
by:
8.1
CVSS
HIGH
SQL Injection
89
CWE
Product Name: phpGedView
Affected Version From: <= 2.65 beta 5
Affected Version To: <= 2.65 beta 5
Patch Exists: NO
Related CWE:
CPE: phpgedview
Platforms Tested:
phpGedView Multiple Vulnerabilities
The phpGedView project has multiple SQL injection vulnerabilities in the 'timeline.php' and 'placelist.php' files. These vulnerabilities are a result of input not being properly validated, allowing an attacker to execute arbitrary SQL queries. Specifically, the 'get_place_list()' function in the 'functions_mysql.php' file does not sanitize the $parent_id and $level variables before including them in the query. This can be exploited by an attacker to manipulate the SQL queries and potentially gain unauthorized access to the database.
Mitigation:
To mitigate these vulnerabilities, it is recommended to sanitize and validate all user input before using it in SQL queries. Additionally, implementing prepared statements or parameterized queries can help prevent SQL injection attacks. It is also advised to keep the software up to date with the latest patches and security updates.