An unauthenticated attacker can perform an SQL injection by accessing the /class/dbconnect.php file and supplying malicious GET parameters. The HTTP GET parameters search, table, field, and value are vulnerable. For example, one SQL injection can be performed on the parameter "field" with the UNION keyword.
This Cyber News was published on www.tenable.com. Publication date: Thu, 12 Dec 2024 14:56:02 +0000