9 lines
No EOL
581 B
Text
Executable file
9 lines
No EOL
581 B
Text
Executable file
source: http://www.securityfocus.com/bid/25112/info
|
|
|
|
Online Store Application Template is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
|
|
|
|
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
|
|
|
|
To demonstrate this issue, use a valid username, such as 'admin', in the Username field, and the following string for the password field of the vulnerable script:
|
|
|
|
anything' OR 'x'='x |