Social Share - 'Username' SQL Injection
Author: Aliaksandr Hartsuyeu type: webapps platform: php port: date_added: 2010-12-21 date_updated: 2014-10-31 verified: 1 codes: tags: aliases: screenshot_url: application_url: raw file: 35131.txt
source: https://www.securityfocus.com/bid/45536/info Social Share is prone to an SQL-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in an SQL query. A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database. The following example input is available: Username: anytext' or verified=1# Password: arbitrary_text