WeBid <= 1.0.2 (feedback.php) SQL Injection Vulnerability

Description:

WeBid contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the feedback.php script not properly sanitizing user-supplied input to the ‘auction_id’ parameter. This may allow an attacker to inject or manipulate SQL queries in the back-end database, allowing for the manipulation or disclosure of arbitrary data.

References:

Disclosure Date:

July 4, 2011