vendor:
phpkit
by:
ea$y laster
7,5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: phpkit
Affected Version From: 1.6.1
Affected Version To: 1.6.1
Patch Exists: NO
Related CWE: N/A
CPE: a:phpkit:phpkit:1.6.1
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009
Phpkit 1.6.1 SQL Injection member.php
The vulnerability exists due to insufficient filtration of user-supplied data passed via the 'searchstr' parameter to '/include.php' script. A remote attacker can execute arbitrary SQL commands in application's database, cause denial of service, access or modify sensitive data, exploit various vulnerabilities in the underlying SQL server software, etc.
Mitigation:
Input validation should be used to prevent SQL injection attacks. All user-supplied data should be filtered and/or validated before being used in SQL queries.