Description
An exploitable SQL injection vulnerability exists in the "access_rules/rules_form" page of the Rukovoditel Project Management App 2.7.2. A specially crafted HTTP request can lead to SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability, this can be done either with administrator credentials or through cross-site request forgery.
Remediation
References
Related Vulnerabilities
Microsoft SQL Server Other Vulnerability (CVE-2000-1083)
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2018-1000410)
Apache Tomcat Improper Input Validation Vulnerability (CVE-2013-4322)
WordPress Plugin Coming Soon Page & Maintenance Mode Cross-Site Scripting (1.8.1)