Description
Multiple SQL injection vulnerabilities in 2daybiz Polls (aka Advanced Poll) Script allow remote attackers to execute arbitrary SQL commands via (1) the password field to login.php, (2) the login field (aka email parameter) to login.php, (3) the password field (aka pass parameter) to the default URI under admin/, and possibly (4) the login field to the default URI under admin/. NOTE: some of these details are obtained from third party information.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Sid3^effects · textwebappsphp
https://www.exploit-db.com/exploits/12395
References (6)
Core 6
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/58189
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/58127
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/39745
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/39622
Exploit exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/12395
Exploit x_refsource_misc
http://packetstormsecurity.org/1004-exploits/aps-sqlxss.txt
Scores
EPSS
0.0161
EPSS Percentile
81.8%
Details
CWE
CWE-89
Status
published
Products (1)
2daybiz/polls_script
Published
May 04, 2010
Tracked Since
Feb 18, 2026