###############################################
Vuln. discovered by : r0t
Date: 27 June 2007
vendor:http://www.qt-cute.org/
affected versions: tested on QuickTalk guestbook 1.2
other versions also can be affected.
###############################################
QuickTalk guestbook contains a flaw that allows a remote sql injection attacks. Input passed to the "id" parameter in "qtg_msg_view.php" isn't properly sanitised before being used in a SQL query.
This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
###############################################
Solution:
Edit the source code to ensure that input is properly sanitised.
###############################################
Subscribe to:
Post Comments (Atom)
1 comment:
Version 1.5 of QuickTalk guestbook fixes the injection risk...
Post a Comment