WeBid <= 1.0.2 (feedback.php) SQL Injection Vulnerability
Description:
WeBid contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the feedback.php script not properly sanitizing user-supplied input to the ‘auction_id’ parameter. This may allow an attacker to inject or manipulate SQL queries in the back-end database, allowing for the manipulation or disclosure of arbitrary data.
References:
Disclosure Date:
July 4, 2011