Francisco Mancardi

5 exploits Active since Jan 2020
CVE-2019-20107 WRITEUP HIGH WRITEUP
Testlink < 1.9.19 - SQL Injection
Multiple SQL injection vulnerabilities in TestLink through 1.9.19 allows remote authenticated users to execute arbitrary SQL commands via the (1) tproject_id parameter to keywordsView.php; the (2) req_spec_id parameter to reqSpecCompareRevisions.php; the (3) requirement_id parameter to reqCompareVersions.php; the (4) build_id parameter to planUpdateTC.php; the (5) tplan_id parameter to newest_tcversions.php; the (6) tplan_id parameter to tcCreatedPerUserGUI.php; the (7) tcase_id parameter to tcAssign2Tplan.php; or the (8) testcase_id parameter to tcCompareVersions.php. Authentication is often easy to achieve: a guest account, that can execute this attack, can be created by anyone in the default configuration.
CVSS 8.8
CVE-2019-20381 WRITEUP MEDIUM WRITEUP
Testlink < 1.9.20 - XSS
TestLink before 1.9.20 allows XSS via non-lowercase javascript: in the index.php reqURI parameter. NOTE: this issue exists because of an incomplete fix for CVE-2019-19491.
CVSS 6.1
CVE-2020-12273 WRITEUP HIGH WRITEUP
Testlink - Insufficiently Protected Credentials
In TestLink 1.9.20, a crafted login.php viewer parameter exposes cleartext credentials.
CVSS 7.5
CVE-2020-12274 WRITEUP CRITICAL WRITEUP
TestLink <1.9.20 - Info Disclosure
In TestLink 1.9.20, the lib/cfields/cfieldsExport.php goback_url parameter causes a security risk because it depends on client input and is not constrained to lib/cfields/cfieldsView.php at the web site associated with the session.
CVSS 9.8
CVE-2020-8638 WRITEUP CRITICAL WRITEUP
TestLink <1.9.20 - SQL Injection
A SQL injection vulnerability in TestLink 1.9.20 allows attackers to execute arbitrary SQL commands in planUrgency.php via the urgency parameter.
CVSS 9.8