HTTP: KubeLabs PHPDug id Parameter SQL Injection

This signature detects attempts to exploit a known SQL injection vulnerability in KubeLabs PHPDug. It is due to insufficient validation of user-supplied input. An attacker can exploit this issue by manipulating the SQL query logic to carry out unauthorized actions on the underlying database.

Extended Description

KubeLabs PHPDug is prone to multiple SQL-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in an SQL query. A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database. PHPDug 2.0.0 is vulnerable; other versions may also be affected.

Affected Products

Kubelabs phpdug

References

BugTraq: 47729

URL: http://www.kubelabs.com/phpdug/

Short Name
HTTP:SQL:INJ:KUBELABS-PHPDUG
Severity
Minor
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Injection KubeLabs PHPDug Parameter SQL bid:47729 id
Release Date
05/06/2011
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Kubelabs

Found a potential security threat?