01 Aug 2012
Manipulation of data
This includes vulnerabilities where a user or a remote attacker can manipulate local data on a system, but not necessarily be able to gain escalated privileges or system access.
The most frequent type of vulnerabilities with this impact are SQL-injection vulnerabilities, where a malicious user or person can manipulate SQL queries.
A vulnerability has been discovered in Limny, which can be exploited by malicious people to conduct SQL injection attacks.
Input passed via e.g. the "q" parameter to index.php is not properly sanitised in the "escape()" function in incs/mysql.class.php before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
The vulnerability is confirmed in version 3.3.1. Other versions may also be affected.
No official solution is currently available.