Description
|
|
Portcullis has reported some vulnerabilities in TestLink, which can be exploited by malicious users to conduct SQL injection attacks.
1) Input passed via the "id" parameter is not properly sanitised in lib/functions/testproject.class.php and lib/functions/tree.class.php before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
2) Input passed via the "name" parameter to lib/project/projectView.php is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
The vulnerabilities are reported in versions prior to 1.9.12.
|