header-logo
Suggest Exploit
vendor:
phpCoin
by:
SecurityFocus
7.5
CVSS
HIGH
SQL Injection and Local File Include
89, 22
CWE
Product Name: phpCoin
Affected Version From: 1.2.1b
Affected Version To: 1.2.1b
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2005

Multiple remote input validation vulnerabilities in phpCoin

Multiple SQL injection vulnerabilities have been reported. An attacker may leverage these issues to manipulate and view arbitrary database contents. phpCoin is also affected by a local file include vulnerability. An attacker may leverage this issue to execute arbitrary server-side script code that resides on an affected computer with the privileges of the Web server process. This may potentially facilitate unauthorized access. This issue may also be exploited to disclose arbitrary files.

Mitigation:

Input validation should be performed to ensure that user-supplied data does not contain malicious SQL or script code.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/12917/info

Multiple remote input validation vulnerabilities affect phpCoin.

Multiple SQL injection vulnerabilities have been reported. An attacker may leverage these issues to manipulate and view arbitrary database contents.

phpCoin is also affected by a local file include vulnerability. An attacker may leverage this issue to execute arbitrary server-side script code that resides on an affected computer with the privileges of the Web server process. This may potentially facilitate unauthorized access. This issue may also be exploited to disclose arbitrary files.

phpCoin 1.2.1b and prior versions are affected by these issues. 

http://www.example.com/auxpage.php?page=../../../some/other/file