JGS-Portal Multiple Cross-Site Scripting and SQL Injection Vulnerabilities

No exploit is required.

The following proof of concept URI are available:
http://www.example.com/jgs_portal.php?anzahl_beitraege=[SQL-Injection]
http://www.example.com/jgs_portal_statistik.php?meinaction=mitglieder&month=1&year=1[SQL-Injection]
http://www.example.com/jgs_portal_statistik.php?meinaction=themen&month=1&year=1[SQL-Injection]
http://www.example.com/jgs_portal_statistik.php?meinaction=beitrag&month=1&year=1[SQL-Injection]
http://www.example.com/jgs_portal_beitraggraf.php?month=1&year=1[SQL-Injection]
http://www.example.com/jgs_portal_viewsgraf.php?jahr=1&monat=1&tag=1[SQL-Injection]
http://www.example.com/jgs_portal_themengraf.php?month=1&year=1[SQL-Injection]
http://www.example.com/jgs_portal_mitgraf.php?month=1&year=1[SQL-Injection]
http://www.example.com/jgs_portal_sponsor.php?id=[SQL-Injection]


 

Privacy Statement
Copyright 2010, SecurityFocus