An issue was discovered in YouPHPTube through 7.7. User input passed through the live_stream_code POST parameter to /plugin/LiveChat/getChat.json.php is not properly sanitized (in getFromChat in plugin/LiveChat/Objects/LiveChatObj.php) before being used to construct a SQL query. This can be exploited by malicious users to, e.g., read sensitive data from the database through in-band SQL Injection attacks. Successful exploitation of this vulnerability requires the Live Chat plugin to be enabled.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T01:54:14.557Z
Reserved: 2019-11-02T00:00:00
Link: CVE-2019-18662

No data.

Status : Modified
Published: 2019-11-02T15:15:10.680
Modified: 2024-11-21T04:33:28.853
Link: CVE-2019-18662

No data.