### [CVE-2019-5117](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5117) ![](https://img.shields.io/static/v1?label=Product&message=YouPHPTube&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=YouPHPTube%206.2%20%2CYouPHPTube%207.6%20%2CYouPHPTube%207.7%20commit%2064d35de96e43c5e5b3d582162c12b86eec7e986b%20(Oct%201st%202019)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20('SQL%20Injection')&color=brightgreen) ### Description Exploitable SQL injection vulnerabilities exists in the authenticated portion of YouPHPTube 7.6. Specially crafted web requests can cause SQL injections. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and in certain configuration, access the underlying operating system. ### POC #### Reference - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0908 #### Github No PoCs found on GitHub currently.