Amoot Web Directory - Password Field SQL Injection
Author: Pouya_Server type: webapps platform: php port: date_added: 2009-03-05 date_updated: 2014-04-13 verified: 1 codes: tags: aliases: screenshot_url: application_url: raw file: 32840.txt
source: https://www.securityfocus.com/bid/34016/info Amoot Web Directory is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. http://www.example.com/[Path]/modir Username:admin Password: ' or '