A SQL injection vulnerability in TestLink 1.9.20 allows attackers to execute arbitrary SQL commands in planUrgency.php via the urgency parameter.
References
Link | Resource |
---|---|
https://ackcent.com/blog/testlink-1.9.20-unrestricted-file-upload-and-sql-injection/ | Exploit Patch Third Party Advisory |
https://github.com/TestLinkOpenSourceTRMS/testlink-code/commit/58f3cc03d5f81cd5cc2ad8c7ba645cc486cebc05 | Patch Third Party Advisory |
https://ackcent.com/blog/testlink-1.9.20-unrestricted-file-upload-and-sql-injection/ | Exploit Patch Third Party Advisory |
https://github.com/TestLinkOpenSourceTRMS/testlink-code/commit/58f3cc03d5f81cd5cc2ad8c7ba645cc486cebc05 | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 05:39
Type | Values Removed | Values Added |
---|---|---|
References | () https://ackcent.com/blog/testlink-1.9.20-unrestricted-file-upload-and-sql-injection/ - Exploit, Patch, Third Party Advisory | |
References | () https://github.com/TestLinkOpenSourceTRMS/testlink-code/commit/58f3cc03d5f81cd5cc2ad8c7ba645cc486cebc05 - Patch, Third Party Advisory |
Information
Published : 2020-04-03 19:15
Updated : 2024-11-21 05:39
NVD link : CVE-2020-8638
Mitre link : CVE-2020-8638
CVE.ORG link : CVE-2020-8638
JSON object : View
Products Affected
testlink
- testlink
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')