header-logo
Suggest Exploit
vendor:
pages.php
by:
JaMbA
7,5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: pages.php
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2010

Specialist Bed and Breakfast website SQL injection

A SQL injection vulnerability exists in the Specialist Bed and Breakfast website, which allows an attacker to inject malicious SQL queries into the application. The vulnerability is located in the 'pages.php' script, where the 'pp_id' parameter is vulnerable to SQL injection. An attacker can inject malicious SQL queries into the application, which can be used to extract sensitive information from the database.

Mitigation:

Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being used in SQL queries.
Source

Exploit-DB raw data:

# Exploit Title: Specialist Bed and Breakfast website SQL injection
Vulnerability
# Date: 30/06/2010
# Author: JaMbA
#Script url: http://www.internetdm.co.uk/site/pages.php?fid=0,1,356
# Version: **N/A
# Tested on: Windows
# CVE : ()

:::::::::::::::::::::::::

:::::::::::::::::::::::::

=================Exploit======
============



[ EXPL0!T ]

http://server/path/pages.php?fid=0,1,472&pp_id=83[SQL]



===========================================================

Greetz to : Alnjm33-virus-pal -g3n1ux - Predator-Ahmadso - xXx-jago-dz
-injecteur-4PY-Tunisian Power Team- XR57 -Tr0y-x -alsaek
And All Tunisian hacker

=== SwT Labs ====