vendor:
Paid 4 Mail Script
by:
ThE g0bL!N
7,5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Paid 4 Mail Script
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009
PHP Paid 4 Mail Script (ID) SQL Injection Vulnerability
The vulnerability exists in the 'paidbanner.php' script, which allows an attacker to inject arbitrary SQL commands via the 'ID' parameter. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable script. This can be done by appending the SQL injection string to the vulnerable parameter in the HTTP request.
Mitigation:
Input validation should be used to prevent SQL injection attacks. All input data should be validated and filtered before being passed to the SQL statement.