vendor:
Responsive Online Blog
by:
Eren Şimşek
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Responsive Online Blog
Affected Version From: v1.0
Affected Version To: v1.0
Patch Exists: N/A
Related CWE: N/A
CPE: a:sourcecodester:responsive_online_blog:1.0
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Linux - Wamp Server
2020
Responsive Online Blog 1.0 – ‘id’ SQL Injection
The vulnerable file is category.php, which contains a parameter 'id' that is used in an SQL query without any changes. An attacker can use sqlmap to exploit the vulnerability by passing the URL 'http://localhost/resblog/category.php?id=1' with the --dbs --batch option, or by passing a single quote in the URL 'http://TARGET/resblog/category.php?id=1' which will cause an SQL error.
Mitigation:
Input validation should be used to prevent SQL injection attacks.