OSVDB ID: 48671

Title: vbLOGIX Tutorial Script main.php cat_id Parameter SQL Injection

Info

Disclosure

Sep 12, 2008

Discovery

Unknown

Dates

Exploit

Sep 12, 2008

Solution

Unknown

Description

vbLOGIX Tutorial Script contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the 'main.php' script not properly sanitizing user-supplied input to the 'cat_id' parameter. This may allow an attacker to inject or manipulate SQL queries in the back-end database.

Classification

Location: Remote / Network Access
Attack Type: Input Manipulation
Impact: Loss of Confidentiality, Loss of Integrity
Exploit: Exploit Public
Disclosure: Uncoordinated Disclosure
OSVDB: Web Related

Solution

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Products

Unknown or Incomplete

References

Credit

  • FIREH4CK3R - firehacker_msnhotmail.com -


Direct URL: http://osvdb.org/48671