CANDID 'view.php' SQL Injection and Cross Site Scripting Vulnerabilities

An attacker can exploit these issues via a browser. To exploit a cross-site scripting issue, the attacker must entice an unsuspecting victim to follow a malicious URI.

The following example URIs are available:

http://www.example.com/image/view.php?image_id=[SQLI]
http://www.example.com/image/view.php?image_id=[XSS]


 

Privacy Statement
Copyright 2010, SecurityFocus