Exploit 4Images 1.7.10 - '/admin/categories.php?cat_parent_id' SQL Injection

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
36643
Проверка EDB
  1. Пройдено
Автор
RANDOMSTORM
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2012-1022
Дата публикации
2012-01-31
4Images 1.7.10 - '/admin/categories.php?cat_parent_id' SQL Injection
Код:
source: https://www.securityfocus.com/bid/51774/info

4images is prone to multiple input-validation vulnerabilities including:

1. A cross-site scripting vulnerability.
2. An open-redirection vulnerability.
3. An SQL-injection vulnerability.

An attacker may leverage these issues to perform spoofing and phishing attacks, to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database and execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site.

4images 1.7.10 is vulnerable; other versions may also be affected. 

http://www.example.com/admin/categories.php?action=addcat&cat_parent_id=1' (SQL Injection)
 
Источник
www.exploit-db.com

Похожие темы