vendor:
DigiLeave
by:
Mr.SQL
8.8
CVSS
HIGH
SQL Injection
89
CWE
Product Name: DigiLeave
Affected Version From: V1.2
Affected Version To: V1.2
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009
DigiLeave V1.2Blind SQL Injection Exploit
DigiLeave V1.2 is vulnerable to Blind SQL Injection. An attacker can exploit this vulnerability to gain access to the database and execute malicious SQL queries. The vulnerability exists in the info_book.asp page, where the book_id parameter is not properly sanitized before being used in a SQL query.
Mitigation:
Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being used in a SQL query.