header-logo
Suggest Exploit
vendor:
Widget Property
by:
Unknown
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Widget Property
Affected Version From: 1.1.19
Affected Version To: Unknown
Patch Exists: No
Related CWE: Unknown
CPE: a:widget_press:widget_property:1.1.19
Metasploit:
Other Scripts:
Platforms Tested:
Unknown

Widget Press Widget Property SQL Injection Vulnerability

The Widget Press Widget Property application is prone to an SQL injection vulnerability. The issue occurs when user-supplied input is not properly sanitized before being used in an SQL query. Remote attackers can exploit this vulnerability to pass malicious input to database queries, which could result in the modification of query logic or other attacks.

Mitigation:

To mitigate this vulnerability, ensure that all user-supplied input is properly sanitized before being used in database queries. Use prepared statements or parameterized queries to prevent SQL injection attacks.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/15701/info

Widget Press Widget Property is prone to an SQL injection vulnerability.

This issue is due to a failure in the application to properly sanitize user-supplied input to the 'property.php' script before using it in an SQL query.

This vulnerability could permit remote attackers to pass malicious input to database queries, resulting in modification of query logic or other attacks.

Widget Property 1.1.19 is reportedly vulnerable. Other versions may be affected as well. 

http://www.example.com/property.php?action=property&property_id=[SQL]

http://www.example.com/property.php?action=search&city_id=&zip_code
=[SQL]&price=&property_type_id=1&submit=submit

http://www.example.com/property.php?action=search&city_id=&zip_code=
&price=75000&property_type_id=[SQL]&submit=submit

http://www.example.com/property.php?action=search&city_id=&zip_code=
&price=[SQL]&property_type_id=&submit=submit

http://www.example.com/property.php?action=search&city_id=[SQL]&zip_code=
&price=&property_type_id=&submit=submit