[原文]Multiple SQL injection vulnerabilities in Cerberus Helpdesk allow remote attackers to execute arbitrary SQL commands via the (1) file_id parameter to attachment_send.php, (2) the $addy variable in email_parser.php, (3) $address variable in email_parser.php, (4) $a_address variable in structs.php, (5) kbid parameter to cer_KnowledgebaseHandler.class.php, (6) queues parameter to addresses_export.php, (7) $thread variable to display.php, (8) ticket parameter to display_ticket_thread.php.
Cerberus Helpdesk Support Center attachment_send.php file_id Parameter SQL Injection
Remote / Network Access
Loss of Confidentiality,
Loss of Integrity
Cereberus Helpdesk Support Center contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the attachment_send.php script not properly sanitizing user-supplied input to the 'id' variable. This may allow an attacker to inject or manipulate SQL queries in the back-end database.
Currently, there are no known upgrades, patches, or workarounds available to correct this issue.