WeBid <= 1.0.2 (feedback.php) SQL Injection Vulnerability


WeBid contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the feedback.php script not properly sanitizing user-supplied input to the ‘auction_id’ parameter. This may allow an attacker to inject or manipulate SQL queries in the back-end database, allowing for the manipulation or disclosure of arbitrary data.


Disclosure Date:

July 4, 2011