An issue was discovered in YouPHPTube through 7.7. User input passed through the live_stream_code POST parameter to /plugin/LiveChat/getChat.json.php is not properly sanitized (in getFromChat in plugin/LiveChat/Objects/LiveChatObj.php) before being used to construct a SQL query. This can be exploited by malicious users to, e.g., read sensitive data from the database through in-band SQL Injection attacks. Successful exploitation of this vulnerability requires the Live Chat plugin to be enabled.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2019-11-02T14:06:20

Updated: 2024-08-05T01:54:14.557Z

Reserved: 2019-11-02T00:00:00

Link: CVE-2019-18662

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-11-02T15:15:10.680

Modified: 2024-11-21T04:33:28.853

Link: CVE-2019-18662

cve-icon Redhat

No data.