exploit-db-mirror/platforms/php/webapps/30572.txt
Offensive Security 30d9cc4c3d Updated 01_04_2014
2014-01-04 23:27:58 +00:00

10 lines
No EOL
728 B
Text
Executable file

source: http://www.securityfocus.com/bid/25615/info
phpMyQuote is prone to multiple input-validation vulnerabilities, including a cross-site scripting issue and an SQL-injection issue, because the application fails to sanitize user-supplied input.
A successful exploit may allow an attacker to steal cookie-based authentication credentials, execute malicious script code in a user's browser, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
These issues affect phpMyQuote 0.20; other versions may also be vulnerable.
http://example.com/script_path/index.php?action=edit&id=[Sql injection]
http://example.com/script_path/index.php?action=edit&id=[XSS]