vendor:
Simple PHP Quiz
by:
HaHwul
7,5
CVSS
HIGH
Blind SQL Injection
89
CWE
Product Name: Simple PHP Quiz
Affected Version From: Latest commit
Affected Version To: Latest commit
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Debian [wheezy]
2016
SimplePHPQuiz – Blind SQL Injection
SimplePHPQuiz is vulnerable to Blind SQL Injection. Attackers can exploit this vulnerability by sending malicious payloads to the vulnerable parameters such as 'correct_answer', 'question', 'wrong_answer1', 'wrong_answer2', and 'wrong_answer3'. By sending a malicious payload, attackers can gain access to the database and extract sensitive information.
Mitigation:
Developers should validate user input and sanitize it before using it in SQL queries. Developers should also use parameterized queries to prevent SQL injection.