exploit-db-mirror/exploits/asp/webapps/29193.txt
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

12 lines
No EOL
910 B
Text

source: https://www.securityfocus.com/bid/21311/info
Click Gallery is prone to multiple input-validation vulnerabilities, including SQL-injection issues and a cross-site scripting issue, because the application fails to sufficiently sanitize user-supplied data.
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.
http://www.example.com/view_gallery.asp?gallery_id=809&currentpage=[SQL Injection]
http://www.example.com/view_gallery.asp?gallery_id=[SQL injection]
http://www.example.com/download_image.asp?image_id=[SQL Injection]
http://www.example.com/gallery.asp?currentpage=[SQL Injection]
http://www.example.com/view_recent.asp?currentpage=[SQL Injection]
http://www.example.com/gallery.asp?currentpage=2&orderby=[SQL Injection]