vendor:
Pixelpost
by:
Gjoko 'LiquidWorm' Krstic
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Pixelpost
Affected Version From: 1.7.2003
Affected Version To: 1.7.2003
Patch Exists: YES
Related CWE: N/A
CPE: a:pixelpost:pixelpost:1.7.3
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Microsoft Windows XP Professional SP3 (EN), Apache 2.2.14 (Win32), PHP 5.3.1, MySQL 5.1.41
2011
Pixelpost 1.7.3 Multiple POST Variables SQL Injection Vulnerability
Pixelpost is vulnerable to an SQL Injection attack when input is passed to several POST parameters (findfid, id, selectfcat, selectfmon, selectftag). The script (admin/index.php) fails to properly sanitize the input before being returned to the user allowing the attacker to compromise the entire DB system and view sensitive information.
Mitigation:
Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being used in an SQL query.