header-logo
Suggest Exploit
vendor:
FAQ
by:
Unknown
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: FAQ
Affected Version From: 1.1 and prior
Affected Version To: Unknown
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested: Unknown
Unknown

Softbiz FAQ SQL Injection Vulnerabilities

The Softbiz FAQ application is vulnerable to multiple SQL injection vulnerabilities due to inadequate input sanitization. An attacker can exploit these vulnerabilities by injecting malicious SQL code into the 'cid' parameter of the 'index.php' page. Successful exploitation can lead to compromising the application, unauthorized access or modification of data, and exploitation of underlying database vulnerabilities.

Mitigation:

To mitigate these vulnerabilities, it is recommended to implement proper input validation and sanitization techniques. Additionally, using prepared statements or parameterized queries can help prevent SQL injection attacks.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/15653/info

Softbiz FAQ is prone to multiple SQL injection vulnerabilities because the application fails to properly sanitize user-supplied input before using it in an SQL query.

A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database.

Softbiz FAQ 1.1 and prior versions are vulnerable; other versions may also be affected. 

http://www.example.com/index.php?cid=[SQL]