vendor:
Nexusphp
by:
flyh4t
7.5
CVSS
HIGH
SQL injection
89
CWE
Product Name: Nexusphp
Affected Version From: nexusphp.v1.5
Affected Version To: nexusphp.v1.5
Patch Exists: NO
Related CWE: CVE-2011-4026
CPE: a:nexusphp:nexusphp:1.5
Platforms Tested: Linux (tested on Linux with Apache)
2011
Nexusphp.v1.5 SQL injection Vulnerability
There is a SQL injection vulnerability in the thanks.php file of Nexusphp v1.5. The vulnerability is caused by not checking the $_POST['id'] parameter, allowing an attacker to perform an SQL injection attack. An attacker can exploit this vulnerability by using the payload _POST[id] : -1 union select version()>4/*
Mitigation:
To mitigate this vulnerability, it is recommended to validate and sanitize user input before using it in SQL queries. This can be done by using prepared statements or parameterized queries.