Family: CGI abuses --> Category: attack
MyReview email SQL Injection Vulnerability Vulnerability Scan
Vulnerability Scan Summary
Checks for SQL injection flaw in MyReview
Detailed Explanation for this Vulnerability Test
The remote web server contains a PHP script that is prone to a SQL
The remote host is running MyReview, an open-source paper submission
and review web application.
The version of MyReview installed on the remote host fails to properly
sanitize input to the 'email' parameter before using it in the
'GetMember' function in a database query. Regardless of PHP's
'magic_quotes_gpc' and 'register_globals' settings, an unauthenticated
attacker may be able to exploit this issue to uncover sensitive
information such as password hashes, modify data, launch attacks
against the underlying database, etc.
See also :
Unknown at this time.
High / CVSS Base Score : 7.0
Click HERE for more information and discussions on this network vulnerability scan.