This vulnerability is currently being exploited in the wild via drive-by-downloads and email campaigns.
In order to exploit this vulnerability, a remote attacker must convince a user to visit a malicious website or open a malicious file that is sent in an email.

RedPhone is vulnerable to SQL injection due to the fact that user input is sanitized before being stored in the database. An attacker can inject SQL statements that have the ability to read or delete data from the database.
RedPhone is vulnerable to cross-site request forgery due to the fact that cookies are sent with every request. An attacker can generate fake requests for RedPhone such that the application responds to her with the data from a different user.
RedPhone is vulnerable to cross-site scripting due to the fact that user input is sanitized before being stored in the database. An attacker can inject malicious code into a user's request to RedPhone. RedPhone is vulnerable to directory traversal due to the fact that user input is sanitized before being stored in the database. An attacker can inject malicious code into a user's request to RedPhone. RedPhone is vulnerable to session hijacking due to the fact that user input is sanitized before being stored in the database. An attacker can generate a user's request to RedPhone such that the application responds to her with the data from a different user

SQL Injection

SQL injection is possible due to the fact that user input is sanitized before being stored in the database. An attacker can inject SQL statements that have the ability to read or delete data from the database.

Timeline

Published on: 10/14/2022 16:15:00 UTC
Last modified on: 10/15/2022 01:50:00 UTC

References