Summary
GDL (Ganesha Digital Library) is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
GDL 4.2 is vulnerable
other versions may also be affected.
Solution
Reports indicate that this issue has been fixed by the vendor but Symantec has not confirmed it. Please contact the vendor for more information.
References
Updated on 2015-03-25
Severity
Classification
-
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- Atlassian JIRA FishEye and Crucible Plugins XML Parsing Unspecified Security Vulnerability
- ActivDesk Multiple Cross Site Scripting and SQL Injection Vulnerabilities
- Apache Axis2 Document Type Declaration Processing Security Vulnerability
- ARRIS 2307 Unprotected Web Console
- Apache Struts2 Redirection and Security Bypass Vulnerabilities