
Cloud Vulnerability DB
A community-led vulnerabilities database
imgurl v2.31 was discovered to contain a Blind SQL injection vulnerability via /upload/localhost. The vulnerability was identified and disclosed on May 24, 2022 (NVD).
The vulnerability exists in the upload.php file where user IP addresses are obtained through multiple methods and directly concatenated into SQL statements between lines 44-58. The issue specifically occurs in the query->uplimit($ip) function. The CVSS score for this vulnerability is 6.8 (CISA).
An attacker could exploit this vulnerability to perform blind SQL injection attacks, potentially allowing unauthorized access to or manipulation of the underlying database. The vulnerability could be used to extract data from the database through carefully crafted boolean-based queries (GitHub Issue).
The recommended fixes include implementing proper input validation for user IP addresses and using PDO (PHP Data Objects) to prevent SQL injection attacks (GitHub Issue).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."