9 lines
No EOL
773 B
Text
9 lines
No EOL
773 B
Text
source: https://www.securityfocus.com/bid/15863/info
|
|
|
|
QuickPayPro is prone to multiple input validation vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input.
|
|
|
|
Successful exploitation of these vulnerabilities could result in a compromise of the application, disclosure or modification of data, the theft of cookie-based authentication credentials. They may also permit an attacker to exploit vulnerabilities in the underlying database implementation as well as other attacks.
|
|
|
|
http://www.example.com/communication/customer.tickets.view.php?so=[SQL]
|
|
http://www.example.com/communication/customer.tickets.view.php?so=ASC&sb=[SQL]
|
|
http://www.example.com/communication/customer.tickets.view.php?so=ASC&sb=Status&nr=[SQL] |