Exploit Bitweaver 1.x - '/wiki/orphan_pages.php?sort_mode' SQL Injection

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
28964
Проверка EDB
  1. Пройдено
Автор
LAURENT GAFFIE
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2006-6924
Дата публикации
2006-11-10
Код:
source: https://www.securityfocus.com/bid/20996/info
   
Bitweaver is prone to multiple SQL-injection and cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied data.
   
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.
   
Bitweaver 1.3.1 and prior versions are vulnerable; other versions may also be affected. 
   
Since this issue is a duplicate of the the issue described in BID 20988 (Bitweaver Multiple Input Validation Vulnerabilities), this BID is being retired.
   
http://www.example.com/bitweaver/wiki/orphan_pages.php?sort_mode=-98
 
Источник
www.exploit-db.com

Похожие темы