First published: Tue Mar 01 2011(Updated: )
SQL injection vulnerability in LightNEasy.php in LightNEasy 3.2.1, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the page parameter, a different vector than CVE-2008-6593, CVE-2010-3484, and CVE-2010-3485. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Lightneasy | =3.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-4752 is considered a high severity SQL injection vulnerability.
To fix CVE-2010-4752, you should disable magic_quotes_gpc and implement proper input validation and prepared statements in your SQL queries.
CVE-2010-4752 is caused by insufficient sanitization of user input in the page parameter within the LightNEasy application.
Only users of LightNEasy version 3.2.1 with magic_quotes_gpc disabled are affected by CVE-2010-4752.
CVE-2010-4752 allows remote attackers to execute arbitrary SQL commands, potentially compromising the database.