ProNews 1.5 - 'lire-avis.php?aa' SQL Injection

Author: Mr_KaLiMaN
type: webapps
platform: php
port: 
date_added: 2006-12-09  
date_updated: 2013-10-29  
verified: 1  
codes: CVE-2006-6519;OSVDB-32188  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 29268.txt  
source: https://www.securityfocus.com/bid/21516/info

ProNews is prone to multiple input-validation vulnerabilities, including multiple HTML-injection issues, an SQL-injection issue, and a cross-site scripting issue, because the application fails to sufficiently sanitize user-supplied input.

A successful exploit of these vulnerabilities could allow an attacker to compromise the application, access or modify data, steal cookie-based authentication credentials, or even exploit vulnerabilities in the underlying database implementation. Other attacks are also possible.

ProNews version 1.5 is vulnerable to these issues.

http://www.example.com/[script_news_path]/lire-avis.php?aa=[SQL INJECTION]