Shawn Bradley PHP Volunteer Management 'id' Parameter SQL Injection Vulnerability
BID:53301
Info
Shawn Bradley PHP Volunteer Management 'id' Parameter SQL Injection Vulnerability
| Bugtraq ID: | 53301 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Apr 28 2012 12:00AM |
| Updated: | Apr 28 2012 12:00AM |
| Credit: | eidelweiss |
| Vulnerable: |
Shawn Bradley PHP Volunteer Management 1.0.2 |
| Not Vulnerable: | |
Discussion
Shawn Bradley PHP Volunteer Management 'id' Parameter SQL Injection Vulnerability
PHP Volunteer Management is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
PHP Volunteer Management 1.0.2 is vulnerable; other versions may also be affected.
PHP Volunteer Management is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
PHP Volunteer Management 1.0.2 is vulnerable; other versions may also be affected.
Exploit / POC
Shawn Bradley PHP Volunteer Management 'id' Parameter SQL Injection Vulnerability
An attacker can exploit the issue using a browser.
The following example data is available:
http://www.example.com/mods/messages/data/get_messages.php?id=[SQLi]&take=10&skip=0&page=1&pageSize=10
An attacker can exploit the issue using a browser.
The following example data is available:
http://www.example.com/mods/messages/data/get_messages.php?id=[SQLi]&take=10&skip=0&page=1&pageSize=10