
Cloud Vulnerability DB
A community-led vulnerabilities database
A critical SQL injection vulnerability was discovered in DBRisinajumi d2files affecting the actionUpload/actionDownloadFile functions in the controllers/D2filesController.php file. The vulnerability was assigned CVE-2015-10018 and was disclosed on January 6, 2023. The issue affects versions prior to 1.0.0 of the d2files component (NVD, GitHub Patch).
The vulnerability exists in the actionUpload and actionDownloadFile functions of D2filesController.php where model_id parameter was not properly type-cast, allowing for potential SQL injection attacks. The CVSS v3.1 base score is 9.8 (CRITICAL) with vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. The issue was fixed by adding proper type casting of the model_id parameter to integer using (int) type conversion (NVD).
If exploited, this vulnerability could allow an attacker to perform SQL injection attacks, potentially leading to unauthorized access to or modification of the database, exposure of sensitive information, and compromise of the application's integrity (NVD).
The vulnerability was patched in version 1.0.0 of d2files. Users should upgrade to this version or later to address the issue. The fix involves properly type-casting the model_id parameter to integer in the affected functions (GitHub Release, GitHub Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."