PHPX 'PXL' Cookie Parameter SQL Injection Vulnerability
BID:30478
Info
PHPX 'PXL' Cookie Parameter SQL Injection Vulnerability
| Bugtraq ID: | 30478 |
| Class: | Input Validation Error |
| CVE: |
CVE-2008-3489 |
| Remote: | Yes |
| Local: | No |
| Published: | Jul 31 2008 12:00AM |
| Updated: | May 07 2015 05:25PM |
| Credit: | gnix <[email protected]> |
| Vulnerable: |
PHPX PHPX 3.5.16 |
| Not Vulnerable: | |
Discussion
PHPX 'PXL' Cookie Parameter SQL Injection Vulnerability
PHPX is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
PHPX 3.5.16 is vulnerable; other versions may also be affected.
PHPX is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
PHPX 3.5.16 is vulnerable; other versions may also be affected.
Exploit / POC
PHPX 'PXL' Cookie Parameter SQL Injection Vulnerability
An attacker can exploit these issues via a browser.
The following example cookie parameter is available:
PXL=a' OR username='admin
An attacker can exploit these issues via a browser.
The following example cookie parameter is available:
PXL=a' OR username='admin
Solution / Fix
PHPX 'PXL' Cookie Parameter SQL Injection Vulnerability
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].