vendor:
Domain Verkaufs und Auktions Portal
by:
Easy Laster
7,5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Domain Verkaufs und Auktions Portal
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2010
phppool media Domain Verkaufs und Auktions Portal index.php SQL Injection
A vulnerability exists in the phppool Domain Verkaufs und Auktions Portal script, which allows an attacker to inject malicious SQL commands via the 'id' parameter in the 'index.php' script. The attacker can exploit this vulnerability by sending a crafted HTTP request containing a malicious SQL query to the vulnerable script. This can be done by appending the malicious SQL query to the 'id' parameter in the 'index.php' script, such as 'http://www.site.com/portal/index.php?a=d&id=-11111111111+union+select+1,2,concat(firstname,0x3a,password,0x3a,email),4,5,6,7,8,9,10,11+from+dsp_buyers--'.
Mitigation:
Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being used in SQL queries. Additionally, parameterized queries should be used to prevent SQL injection attacks.