Description
Multiple SQL injection vulnerabilities in login.php in 2daybiz Auction Script allow remote attackers to execute arbitrary SQL commands via (1) the login field (aka the username parameter), and possibly (2) the password field, to index.php. NOTE: some of these details are obtained from third party information.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Sid3^effects · textwebappsphp
https://www.exploit-db.com/exploits/12414
References (7)
Core 7
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/58188
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/64097
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/39728
Vendor Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2010/1015
Exploit x_refsource_misc
http://packetstormsecurity.org/1004-exploits/2daybizauctionscript-sql.txt
Exploit exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/12414
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/39621
Scores
EPSS
0.0172
EPSS Percentile
82.5%
Details
CWE
CWE-89
Status
published
Products (1)
2daybiz/auction_script
Published
May 04, 2010
Tracked Since
Feb 18, 2026