You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Note: I found this vulnerable parameter while I was testing a university for vulnerabilities as an external security researcher, I reported to them as well through email, but no response yet since august,2024
Vulnerable PHP File
https://github.com/ganglia/ganglia-web/blob/master/graph_all_periods.php
Vulnerable GET Parameter: 'h'
line 16 of graph_all_periods.php file
Root Cause:
sanitize() function at line 353 of file location (https://github.com/ganglia/ganglia-web/blob/master/functions.php) is not properly implemented to handle all kinds of malicious user inputs.
Secure Code Suggestion:
Use htmlspecialchars() function to safely and securely sanitize all user inputs
PHP Secure Coding Guide:
https://www.capitalnumbers.com/blog/secure-php-applications-detailed-guide/
Note: I found this vulnerable parameter while I was testing a university for vulnerabilities as an external security researcher, I reported to them as well through email, but no response yet since august,2024
POC:
Payload Used:
Screenshot Proof:
CVE Request
Also will this be assigned a CVE with the author name?
The text was updated successfully, but these errors were encountered: