vendor:
Yamamah
by:
indoushka
7,5
CVSS
HIGH
Blind SQL/XPath injection
89
CWE
Product Name: Yamamah
Affected Version From: 1.00
Affected Version To: 1.00
Patch Exists: NO
Related CWE: N/A
CPE: a:yamamah:yamamah:1.00
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Lunix Français v.(9.4 Ubuntu)
2009
Yamamah Version 1.00 Mullti Vulnerability
An attacker can exploit a blind SQL/XPath injection vulnerability in Yamamah Version 1.00 by sending a crafted HTTP request to the vulnerable server. The attacker can use the 'calbums' parameter to inject malicious SQL/XPath statements into the application and gain access to sensitive information from the database.
Mitigation:
Input validation should be used to prevent malicious SQL/XPath injection attacks. Additionally, the application should use parameterized queries to prevent SQL injection.