ID SSV:80451 Type seebug Reporter Root Modified 2014-07-01T00:00:00
Description
No description provided by source.
source: http://www.securityfocus.com/bid/15863/info
QuickPayPro is prone to multiple input validation vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input.
Successful exploitation of these vulnerabilities could result in a compromise of the application, disclosure or modification of data, the theft of cookie-based authentication credentials. They may also permit an attacker to exploit vulnerabilities in the underlying database implementation as well as other attacks.
http://www.example.com/communication/customer.tickets.view.php?so=[SQL]
http://www.example.com/communication/customer.tickets.view.php?so=ASC&sb=[SQL]
http://www.example.com/communication/customer.tickets.view.php?so=ASC&sb=Status&nr=[SQL]
{"lastseen": "2017-11-19T14:24:48", "modified": "2014-07-01T00:00:00", "description": "No description provided by source.", "cvss": {"score": 0.0, "vector": "NONE"}, "published": "2014-07-01T00:00:00", "status": "poc", "enchantments": {"score": {"value": 0.6, "vector": "NONE", "modified": "2017-11-19T14:24:48", "rev": 2}, "dependencies": {"references": [], "modified": "2017-11-19T14:24:48", "rev": 2}, "vulnersScore": 0.6}, "href": "https://www.seebug.org/vuldb/ssvid-80451", "references": [], "enchantments_done": [], "id": "SSV:80451", "title": "QuickPayPro 3.1 customer.tickets.view.php Multiple Parameter SQL Injection", "bulletinFamily": "exploit", "reporter": "Root", "cvelist": [], "viewCount": 1, "sourceData": "\n source: http://www.securityfocus.com/bid/15863/info\r\n \r\nQuickPayPro is prone to multiple input validation vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input.\r\n \r\nSuccessful exploitation of these vulnerabilities could result in a compromise of the application, disclosure or modification of data, the theft of cookie-based authentication credentials. They may also permit an attacker to exploit vulnerabilities in the underlying database implementation as well as other attacks.\r\n\r\nhttp://www.example.com/communication/customer.tickets.view.php?so=[SQL]\r\nhttp://www.example.com/communication/customer.tickets.view.php?so=ASC&sb=[SQL]\r\nhttp://www.example.com/communication/customer.tickets.view.php?so=ASC&sb=Status&nr=[SQL]\n ", "sourceHref": "https://www.seebug.org/vuldb/ssvid-80451", "type": "seebug"}