Written by g4t3w4y
Tuesday, 17 March 2009 21:37
GDL 'node' Parameter SQL Injection Vulnerability
Input Validation Error
Mar 17 2009 12:00AM
Mar 17 2009 07:56PM
GDL GDL 4.2
GDL GDL 4.0
GDL (Ganesha Digital Library) is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize
user-supplied data before using it in an SQL query.
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit
latent vulnerabilities in the underlying database.
GDL 4.0 and 4.2 are vulnerable; other versions may also be affected.
Attackers can use a browser to exploit this issue.
The following is sufficient to exploit this issue:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of
more recent information, please mail us at: