vendor:
Portail PHP
by:
SecurityFocus
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Portail PHP
Affected Version From: 2.4
Affected Version To: 2.4
Patch Exists: Unknown
Related CWE: N/A
CPE: a:portail_php:portail_php:2.4
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Unknown
2005
Portail PHP SQL Injection Vulnerability
Portail PHP is prone to an SQL injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in SQL queries. The consequences of this attack may vary depending on the type of queries that can be influenced, and the implementation of the database.
Mitigation:
Input validation should be used to ensure that user-supplied data is properly sanitized before being used in SQL queries.