SQL Injection Vulnerability in phpGACL by phpGACL Team
CVE-2020-13566
8.8HIGH
What is CVE-2020-13566?
phpGACL version 3.3.7 is susceptible to SQL injection when attackers manipulate the POST parameters in specific HTTP requests. Particularly, if the 'action' parameter is set to 'Delete', the 'delete_group' parameter can be crafted to execute arbitrary SQL commands, compromising the database integrity. This vulnerability enables attackers to potentially gain unauthorized access to sensitive data, highlighting the necessity for immediate patching and implementation of secure coding practices.
Affected Version(s)
phpGACL phpGACL 3.3.7
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
CVSS V3.0
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
