header-logo
Suggest Exploit
vendor:
QuickPayPro
by:
7.5
CVSS
HIGH
Input Validation
CWE
Product Name: QuickPayPro
Affected Version From:
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:

Multiple Input Validation Vulnerabilities in QuickPayPro

QuickPayPro is prone to multiple input validation vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input. Successful exploitation of these vulnerabilities could result in a compromise of the application, disclosure or modification of data, and theft of cookie-based authentication credentials. They may also permit an attacker to exploit vulnerabilities in the underlying database implementation as well as other attacks.

Mitigation:

To mitigate these vulnerabilities, it is recommended to implement proper input validation and sanitization techniques in the application code. Regular security audits and penetration testing can also help identify and fix any potential security flaws.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/15863/info

QuickPayPro is prone to multiple input validation vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input.

Successful exploitation of these vulnerabilities could result in a compromise of the application, disclosure or modification of data, the theft of cookie-based authentication credentials. They may also permit an attacker to exploit vulnerabilities in the underlying database implementation as well as other attacks.

http://www.example.com/communication/popups.edit.php?popupid=[SQL]