Home page logo
/

fulldisclosure logo Full Disclosure mailing list archives

[HTTPCS] Handshakes Professional 'frm_id' Remote SQL Injection Vulnerability
From: HTTPCS <contact () httpcs com>
Date: Mon, 1 Oct 2012 20:10:16 +0200 (CEST)

HTTPCS Advisory : HTTPCS70
Product : Handshakes Professional
Version : 4.1
Date : 2012-10-01
Criticality level : Highly Critical
Description : A vulnerability has been discovered in Handshakes Professional,
which can be exploited by malicious people to conduct SQL injection attacks.
Input passed via the 'frm_id' parameter to '/index.php' is not properly
sanitised before being used in a SQL query. This can be exploited to manipulate
SQL queries by injecting arbitrary SQL code.
Page : /index.php
Variables : page=forum&section=forum&frm_id=[VulnHTTPCS]
Type : SQLI
Method : GET
Solution :
References : https://www.httpcs.com/advisory/httpcs70
Credit : HTTPCS [Web Vulnerability Scanner]
_______________________________________________

Twitter : http://twitter.com/HTTPCS_
Free web vulnerability scanner HTTPCS : https://www.httpcs.com/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

  By Date           By Thread  

Current thread:
  • [HTTPCS] Handshakes Professional 'frm_id' Remote SQL Injection Vulnerability HTTPCS (Oct 02)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]