vendor:
V4.rgo
by:
Easy Laster
7,5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: V4.rgo
Affected Version From: V4.rgo
Affected Version To: V4.rgo
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: PHP
2010
DZ Auktionshaus “V4.rgo” (id) news.php SQL Injection
The vulnerability exists in the 'news.php' script, which allows an attacker to inject malicious SQL queries via the 'id' parameter. The exploit can be triggered by sending a crafted HTTP request to the vulnerable server, containing a malicious SQL query in the 'id' parameter. This can be exploited to extract sensitive information from the database, such as usernames and passwords.
Mitigation:
Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being used in SQL queries.