Multiple SQL injection vulnerabilities in dotProject prior to 2.1.7 allow remote authenticated administrators to execute arbitrary SQL commands via the (1) search_string or (2) where parameter in a contacts action, (3) dept_id parameter in a departments action, (4) project_id[] parameter in a project action, or (5) company_id parameter in a system action to index.php. NOTE: this can be leveraged using CSRF to allow remote malicious users to execute arbitrary SQL commands.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
dotproject dotproject |