vendor:
php planner
by:
anT!-Tr0J4n
7,5
CVSS
HIGH
XSS/SQL Injection
89, 79
CWE
Product Name: php planner
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Win7/Linux
2010
phpplanner XSS / SQL Vulnerability
An attacker can exploit this vulnerability by sending a malicious SQL query to the vulnerable application. The malicious query can be sent via the 'userid' parameter in the 'userinfo.php' page. An attacker can also exploit this vulnerability by sending a malicious XSS payload to the vulnerable application. The malicious payload can be sent via the 'msg' parameter in the 'notice.php' page.
Mitigation:
Input validation should be used to prevent SQL injection attacks. Output encoding should be used to prevent XSS attacks.