vendor:
Sendy
by:
marduk369
7,5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Sendy
Affected Version From: 1.1.9.1
Affected Version To: 1.1.9.1
Patch Exists: NO
Related CWE: N/A
CPE: a:sendy:sendy:1.1.9.1
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux Ubuntu 10.04 (Lucid Lynx)
2014
Sendy 1.1.9.1 – SQL Injection Vulnerability
Sendy 1.1.9.1 is vulnerable to SQL injection. An attacker can exploit this vulnerability to gain access to the database and execute arbitrary SQL commands. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'c' parameter of the 'send-to' page. An attacker can exploit this vulnerability by sending a specially crafted HTTP request with malicious SQL statements to the vulnerable application.
Mitigation:
Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being used in SQL queries. Additionally, parameterized queries should be used to prevent SQL injection attacks.