vendor:
dsmsf
by:
Inj3ct0r
7,5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: dsmsf
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: N/A
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2010
PHP-fusion dsmsf (module downloads) SQL Inj3ct0r Exploit
The vulnerability exists in the file screen.php, where an attacker can inject a malicious SQL query via the 'view_id' parameter. An example exploit is 'screen.php?view_id=-1+union+select+version()--'
Mitigation:
Input validation should be used to prevent SQL injection attacks.