Jump to content

phpVMS SQL Injection Vulnerability


servetas

Recommended Posts

  • Administrators

The module has been updated on GitHub. The method that is used in this exploit example is also over a year old, the module was updated in March 2012 to normalize the functions within the phpVMS environment.

If you are using the version that was updated in March of 2012 you only need to replace the PopUpNews.php and PopUpNewsData.class.php files, or make the edits to them. If you are using the older version that used the "$_GET" method I would suggest updating to the latest version.

Commits can be found here -> https://github.com/DavidJClark/phpVMS-PopUpNews/commits/master

Module can be found here -> https://github.com/DavidJClark/phpVMS-PopUpNews

  • Like 2
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Restore formatting

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
×
×
  • Create New...