source: http://www.securityfocus.com/bid/45812/info Alguest is prone to an SQL-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in an SQL query. A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database. Alguest 1.1c-patched is vulnerable; other versions may also be affected. The following example POST request is available: POST /alguest/elimina.php HTTP/1.0 Host: website Cookie: admin=1 Content-Length: N send=elimina&elimina=[SQL Injection]
Related Exploits
Other Possible E-DB Search Terms: Alguest 1.1c-patched, AlguestDate | D | V | Title | Author |
---|---|---|---|---|
2010-12-06 |
![]() |
Alguest 1.1 - 'start' SQL Injection | Aliaksandr ... | |
2010-12-03 |
![]() |
Alguest 1.1 - Multiple Cookie Authentication Bypass Vulnerabilities | Aliaksandr ... |