1. Symantec-Broadcom-Horizontal/
  2. Security Response/
  3. Attack Signatures/
  4. Attack: TestLink SQL Injection CVE-2012-0939

Attack: TestLink SQL Injection CVE-2012-0939

Severity: High

This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.

Description

This signature detects an SQL injection attempt against a TestLink server.

Additional Information

TestLink is a PHP-based testing suite.

The application is prone to multiple SQL-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in an SQL query.

1. Multiple SQL-injection vulnerabilities affect the following scripts and parameters:

'getrequirementnodes.php' : 'root_node'
'gettprojectnodes.php' : 'root_node'
'cfieldsEdit.php' : 'cfield_id'
'planMilestonesEdit.php' : 'id'
'planMilestonesEdit.php' : 'tplan_id'
'reqEdit.php' : 'req_spec_id'
'reqImport.php' : 'req_spec_id'

These issues affect TestLink versions 1.8.5b and 1.9.3.

2. Multiple SQL-injection vulnerabilities affect the following scripts and parameters:

'reqSpecAnalyse.php' : 'req_spec_id'
'reqSpecPrint.php' : 'req_spec_id'
'reqSpecView.php' : 'req_spec_id'

These issues affect TestLink 1.8.5b.

A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database.

Affected

  • TestLink versions 1.8.5b and 1.9.3

Additional References

  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube