Duyuru Scripti Goster.ASP SQL injection Vulnerability
BID:22910
Info
Duyuru Scripti Goster.ASP SQL injection Vulnerability
| Bugtraq ID: | 22910 |
| Class: | Input Validation Error |
| CVE: |
CVE-2007-1422 |
| Remote: | Yes |
| Local: | No |
| Published: | Mar 10 2007 12:00AM |
| Updated: | May 12 2015 07:29PM |
| Credit: | Cr@zy_King is credited with the discovery of this vulnerability. |
| Vulnerable: |
Duyuru Scripti Duyuru Scripti 0 |
| Not Vulnerable: | |
Discussion
Duyuru Scripti Goster.ASP SQL injection Vulnerability
Duyuru Scripti is prone to an SQL-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in an SQL query.
Exploiting this vulnerability could permit remote attackers to pass malicious input to database queries, resulting in the modification of query logic or other attacks.
Duyuru Scripti is prone to an SQL-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in an SQL query.
Exploiting this vulnerability could permit remote attackers to pass malicious input to database queries, resulting in the modification of query logic or other attacks.
Exploit / POC
Duyuru Scripti Goster.ASP SQL injection Vulnerability
Attackers can use a browser to exploit this issue.
The following exploit is available:
Attackers can use a browser to exploit this issue.
The following exploit is available:
Solution / Fix
Duyuru Scripti Goster.ASP SQL injection Vulnerability
Solution:
Currently we are not aware of any patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
References
Duyuru Scripti Goster.ASP SQL injection Vulnerability
References:
References:
- Duyuru Scripti Homepage (Duyuru Scripti)
- Fıstıq Duyuru Scripti Remote Sql İnjection Exploit (Cr@zy_King)