Description
|
|
Multiple vulnerabilities have been discovered in netOffice Dwins, which can be exploited by malicious people to conduct SQL injection attacks.
Input passed via the "S_ATSEL" parameter to reports/export_leaves.php and reports/export_person_performance.php and "id" parameter to expenses/approveexpense.php, calendar/exportcalendar.php, analysis/expanddimension.php, and analysis/changedimensionsortingorder.php is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
The vulnerabilities are confirmed in version 1.4p3. Other versions may also be affected.
|