exploit-db-mirror/exploits/php/webapps/28327.txt
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

12 lines
No EOL
844 B
Text

source: https://www.securityfocus.com/bid/19327/info
Vwar is prone to multiple input-validation vulnerabilities, including cross-site scripting and SQL-injection issues. These issues occur because the application fails to properly sanitize user-supplied input.
A successful exploit of these vulnerabilities could allow an attacker to compromise the application, access or modify data, steal cookie-based authentication credentials, or even exploit vulnerabilities in the underlying database implementation. Other attacks are also possible.
http://www.example.com/vwar/war.php?s=[SQL]
http://www.example.com/vwar/war.php?page=[SQL]or[xss]
http://www.example.com/vwar/war.php?showgame=[SQL]
http://www.example.com/vwar/war.php?sortby=[sql]
http://www.example.com/vwar/war.php?sortorder=[sql]
http://www.example.com/vwar/calendar.php?year=[xss]