7 lines
No EOL
460 B
Text
7 lines
No EOL
460 B
Text
source: https://www.securityfocus.com/bid/7401/info
|
|
|
|
It has been reported that OpenBB does not properly check input passed via the 'index.php' script. Because of this, an attacker may be able to inject arbitrary commands to the database in the context of the bulletin board software. The consequences will vary depending on the underlying database implementation.
|
|
|
|
http://www.example.com/index.php?CID=1%20<something>
|
|
|
|
where <something> represents a SQL query. |