Learn about CVE-2019-16694, a SQL injection vulnerability in phpIPAM 1.4 that allows attackers to execute malicious SQL queries through the 'table' parameter in the 'edit-result.php' file.
phpIPAM 1.4 allows SQL injection via the app/admin/custom-fields/edit-result.php table parameter when action=add is used.
Understanding CVE-2019-16694
When using the "action=add" parameter in phpIPAM 1.4, there is a possibility of SQL injection through the "table" parameter in the "edit-result.php" file within the "app/admin/custom-fields" directory.
What is CVE-2019-16694?
CVE-2019-16694 is a vulnerability in phpIPAM 1.4 that enables SQL injection when the "action=add" parameter is utilized in the "edit-result.php" file.
The Impact of CVE-2019-16694
This vulnerability allows attackers to execute malicious SQL queries through the "table" parameter, potentially leading to unauthorized access to the database and sensitive information.
Technical Details of CVE-2019-16694
Vulnerability Description
The vulnerability arises in phpIPAM 1.4 due to improper handling of user input in the "edit-result.php" file, allowing SQL injection attacks.
Affected Systems and Versions
Exploitation Mechanism
Mitigation and Prevention
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates