vendor:
Pay Per Watch & Bid Auktions System
by:
Easy Laster
7,5
CVSS
HIGH
BLIND SQL Injection
89
CWE
Product Name: Pay Per Watch & Bid Auktions System
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2010
Pay Per Watch & Bid Auktions System BLIND SQL Injection auktion.php (id_auk)
A vulnerability in the Pay Per Watch & Bid Auktions System allows an attacker to inject malicious SQL commands into the 'id_auk' parameter of the 'auktion.php' script. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. This can be used to disclose the contents of the database, including usernames and passwords.
Mitigation:
Input validation should be used to prevent SQL injection attacks. Additionally, the application should use parameterized queries to prevent SQL injection.