Summary
Family Connections is prone to multiple input-validation vulnerabilities, including a local file-include issue, an arbitrary file-upload issue, and multiple SQL-injection issues. These issues occur because the application fails to properly sanitize user- supplied input.
Exploiting these issues may allow an unauthorized user to view files and execute local scripts, execute arbitrary script code, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.
Family Connections versions 2.1.3 and prior are affected.
References
Updated on 2015-03-25
Severity
Classification
-
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- Apache Struts2 Showcase Arbitrary Java Method Execution vulnerability
- Advantech Studio 'NTWebServer.exe' Directory Traversal Vulnerability
- A Really Simple Chat Multiple SQL Injection Vulnerabilities
- AlienVault Open Source SIEM (OSSIM) 'timestamp' Parameter Directory Traversal Vulnerability
- Atutor AChecker Multiple SQL Injection and XSS Vulnerabilities