Web Cookbook Multiple SQL Injection
Web Cookbook is vulnerable to multiple SQL Injection vulnerabilities. The application does not properly sanitize user-supplied input before using it in an SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. The vulnerabilities are located in the 'searchrecipe.php' and 'showtext.php' scripts when processing the 'sstring', 'mode', 'title', 'prefix', 'preparation', 'postfix', 'tipp' and 'ingredient' parameters. An attacker can exploit these vulnerabilities to inject arbitrary SQL code to manipulate SQL queries and disclose sensitive information from the database. Additionally, the application is also vulnerable to a simple non-persistent XSS vulnerability when processing the 'sstring' parameter.