WSN Guest Comment.PHP SQL injection Vulnerability
BID:22969
Info
WSN Guest Comment.PHP SQL injection Vulnerability
| Bugtraq ID: | 22969 |
| Class: | Input Validation Error |
| CVE: |
CVE-2007-1517 |
| Remote: | Yes |
| Local: | No |
| Published: | Mar 11 2007 12:00AM |
| Updated: | May 12 2015 07:33PM |
| Credit: | UniquE-Key is credited with the discovery of this vulnerability. |
| Vulnerable: |
Paul Knierim WSN Guest 1.21 |
| Not Vulnerable: | |
Discussion
WSN Guest Comment.PHP SQL injection Vulnerability
WSN Guest is prone to an SQL-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in an SQL query.
Exploiting this vulnerability could permit remote attackers to pass malicious input to database queries, resulting in the modification of query logic or other attacks.
This issue affects version 1.21; other versions may also be affected.
WSN Guest is prone to an SQL-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in an SQL query.
Exploiting this vulnerability could permit remote attackers to pass malicious input to database queries, resulting in the modification of query logic or other attacks.
This issue affects version 1.21; other versions may also be affected.
Exploit / POC
WSN Guest Comment.PHP SQL injection Vulnerability
Attackers can use a browser to exploit this issue.
The exploit code is available:
Attackers can use a browser to exploit this issue.
The exploit code is available:
Solution / Fix
WSN Guest Comment.PHP SQL injection Vulnerability
Solution:
Currently we are not aware of any patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
References
WSN Guest Comment.PHP SQL injection Vulnerability
References:
References: