header-logo
Suggest Exploit
vendor:
Bandersnatch
by:
7.5
CVSS
HIGH
Input-validation vulnerabilities
89
CWE
Product Name: Bandersnatch
Affected Version From: 0.4
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:

Input-validation vulnerabilities in Bandersnatch

Bandersnatch is prone to multiple input-validation vulnerabilities because the application fails to sanitize user-supplied input. These issues include multiple SQL-injections vulnerabilities and an HTML-injection vulnerability. A successful exploit may allow an attacker to steal cookie-based authentication credentials, execute malicious script code, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

Mitigation:

To mitigate these vulnerabilities, it is recommended to implement proper input validation and sanitization techniques. Additionally, keeping the application and underlying dependencies up-to-date with the latest security patches can help prevent exploitation.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/25094/info

Bandersnatch is prone to multiple input-validation vulnerabilities because the application fails to sanitize user-supplied input. These issues include multiple SQL-injections vulnerabilities and an HTML-injection vulnerability.

A successful exploit may allow an attacker to steal cookie-based authentication credentials, execute malicious script code, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

This issue affects Bandersnatch 0.4; other versions may also be affected. 

http://www.example.com/index.php?date=[SQL]
http://www.example.com/index.php?limit=[SQL]