OSVDB ID: 20251

Title: Zomplog get.php catid Parameter SQL Injection

Info

Disclosure

Oct 20, 2005

Discovery

Unknown

Dates

Exploit

Unknown

Solution

Unknown

Description

Zomplog contains a flaw that may allow a remote attacker to carry out an SQL injection attack. The issue is due to the 'get.php' script not properly sanitizing user-supplied input to the 'catid' variable. This may allow a remote attacker to inject or manipulate SQL queries in the back-end database.

Classification

Location: Remote / Network Access
Attack Type: Input Manipulation
Impact: Loss of Confidentiality, Loss of Integrity
OSVDB: Web Related

Solution

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Products

Gerben Schmidt

Zomplog

3.4

References

Credit

  • Brian Walter - bipicciutihotmail.com -


Direct URL: http://osvdb.org/20251