header-logo
Suggest Exploit
vendor:
PHP Pro Bid
by:
7.5
CVSS
HIGH
Cross-Site Scripting (XSS), SQL Injection
79, 89
CWE
Product Name: PHP Pro Bid
Affected Version From: 5.24
Affected Version To: 5.24
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:

Input-validation vulnerabilities in PHP Pro Bid

PHP Pro Bid is prone to multiple input-validation vulnerabilities, including cross-site scripting and SQL-injection issues, because the application fails to properly sanitize user-supplied input. A successful exploit of these vulnerabilities could allow an attacker to compromise the application, access or modify data, steal cookie-based authentication credentials, or even exploit vulnerabilities in the underlying database implementation. Other attacks are also possible.

Mitigation:

Implement proper input validation and sanitization techniques. Regularly update to the latest patched version of PHP Pro Bid.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/19158/info
  
PHP Pro Bid is prone to multiple input-validation vulnerabilities, including cross-site scripting and SQL-injection issues, because the application fails to properly sanitize user-supplied input. 
  
A successful exploit of these vulnerabilities could allow an attacker to compromise the application, access or modify data, steal cookie-based authentication credentials, or even exploit vulnerabilities in the underlying database implementation. Other attacks are also possible.
  
Version 5.24 is vulnerable to these issues; other versions may also be affected.

http://www.example.com/categories.php?parent=&start=&orderField=itemname&orderType =1'[SQL]