Multiple SQL injection vulnerabilities in TestLink 1.9.3, 1.8.5b, and earlier allow remote authenticated users with certain permissions to execute arbitrary SQL commands via the root_node parameter in the display_children function to (1) getrequirementnodes.php or (2) gettprojectnodes.php in lib/ajax/; the (3) cfield_id parameter in an edit action to lib/cfields/cfieldsEdit.php; the (4) id parameter in an edit action or (5) plan_id parameter in a create action to lib/plan/planMilestonesEdit.php; or the req_spec_id parameter to (6) reqImport.php or (7) in a create action to reqEdit.php in lib/requirements/. NOTE: some of these details are obtained from third party information.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:36
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/bugtraq/2012-02/0104.html - | |
References | () http://osvdb.org/79450 - | |
References | () http://osvdb.org/79451 - | |
References | () http://osvdb.org/79452 - | |
References | () http://osvdb.org/79453 - | |
References | () http://osvdb.org/79454 - | |
References | () http://secunia.com/advisories/48054 - | |
References | () http://www.securityfocus.com/bid/52086 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/73327 - |
Information
Published : 2014-08-14 14:55
Updated : 2025-04-12 10:46
NVD link : CVE-2012-0938
Mitre link : CVE-2012-0938
CVE.ORG link : CVE-2012-0938
JSON object : View
Products Affected
testlink
- testlink
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')