Title: Disqus Blog Comments index.php id Parameter SQL Injection
Aug 29, 2012
Disqus Blog Comments contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the index.php script not properly sanitizing user-supplied input to the 'id' parameter. This may allow an attacker to inject or manipulate SQL queries in the back-end database, allowing for the manipulation or disclosure of arbitrary data.
Remote / Network Access
Loss of Integrity
OSVDB is not aware of a solution for this vulnerability.