vendor:
PHP Video Battle
by:
v3n0m
7,5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: PHP Video Battle
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: N/A
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2010
PHP Video Battle SQL Injection Vulnerability
An attacker can exploit this vulnerability by sending a crafted SQL query to the vulnerable application. The crafted query can be sent via the 'cat' parameter in the 'browse.html' page. For example, sending the following payload will reveal the version of the database: -9999+union+all+select+1,2,version(),4,5,6--
Mitigation:
Input validation should be used to prevent SQL injection attacks.