First published: Thu Jul 04 2019(Updated: )
A SQL Injection issue was discovered in webERP 4.15. Payments.php accepts payment data in base64 format. After this is decoded, it is deserialized. Then, this deserialized data goes directly into a SQL query, with no sanitizing checks.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
=4.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.