header-logo
Suggest Exploit
vendor:
Portail PHP
by:
SecurityFocus
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Portail PHP
Affected Version From: 2.4
Affected Version To: 2.4
Patch Exists: Unknown
Related CWE: N/A
CPE: a:portail_php:portail_php:2.4
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Unknown
2005

Portail PHP SQL Injection Vulnerability

Portail PHP is prone to an SQL injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in SQL queries. The consequences of this attack may vary depending on the type of queries that can be influenced, and the implementation of the database.

Mitigation:

Input validation should be used to ensure that user-supplied data is properly sanitized before being used in SQL queries.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/14474/info

Portail PHP is prone to an SQL injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in SQL queries.

The consequences of this attack may vary depending on the type of queries that can be influenced, and the implementation of the database.

This issue is reported to affect Portail PHP version 2.4; Conflicting reports indicate this information may be inaccurate. 

http://www.example.com/portailphp/index.php?affiche=Forum-read_mess&id='