Multiple SQL injection vulnerabilities in TestLink 1.9.3, 1.8.5b, and earlier allow remote authenticated users with certain permissions to execute arbitrary SQL commands via the root_node parameter in the display_children function to (1) getrequirementnodes.php or (2) gettprojectnodes.php in lib/ajax/; the (3) cfield_id parameter in an edit action to lib/cfields/cfieldsEdit.php; the (4) id parameter in an edit action or (5) plan_id parameter in a create action to lib/plan/planMilestonesEdit.php; or the req_spec_id parameter to (6) reqImport.php or (7) in a create action to reqEdit.php in lib/requirements/. NOTE: some of these details are obtained from third party information.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2014-08-14 14:55
Updated : 2024-02-04 18:35
NVD link : CVE-2012-0938
Mitre link : CVE-2012-0938
CVE.ORG link : CVE-2012-0938
JSON object : View
Products Affected
testlink
- testlink
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')