exploit-db-mirror/platforms/php/webapps/22520.txt
Offensive Security fffbf04102 Updated
2013-12-03 19:44:07 +00:00

7 lines
No EOL
484 B
Text
Executable file

source: http://www.securityfocus.com/bid/7405/info
It has been reported that OpenBB does not properly check input passed via the 'member.php' script. Because of this, an attacker may be able to inject arbitrary commands to the database in the context of the bulletin board software. The consequences will vary depending on the underlying database implementation.
http://www.example.com/member.php?action=profile&UID=1%20<something>
where <something> represents a SQL query.