header-logo
Suggest Exploit
vendor:
SourceWell
by:
Not mentioned
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: SourceWell
Affected Version From: Not mentioned
Affected Version To: Not mentioned
Patch Exists: NO
Related CWE: Not mentioned
CPE: Not mentioned
Metasploit:
Other Scripts:
Platforms Tested: Not mentioned
2005

BerliOS SourceWell SQL Injection Vulnerability

The BerliOS SourceWell application is prone to an SQL injection vulnerability. This vulnerability occurs when user-supplied input is not properly sanitized before being used in an SQL query. An attacker can exploit this vulnerability to compromise the application, disclose or modify data, or exploit vulnerabilities in the underlying database implementation.

Mitigation:

To mitigate this vulnerability, it is recommended to sanitize user-supplied input before using it in SQL queries. Additionally, using parameterized queries or prepared statements can help prevent SQL injection attacks.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/15586/info

BerliOS SourceWell is prone to an SQL injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query.

Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation. 

/index.php?start=2005-11-28&days=1&cnt=[SQL]