============ { Ariko-Security - Advisory #4/3/2010 } =============
SQL injection vulnerability in wILD CMS
Vendor's Description of Software:
Vulnerable DEMO
Dork:
Application Info:
Vulnerability Info:
Fix:
Time Table:
Input passed via the "page_id" parameter to page.php is not properly sanitised before being used in a SQL
query.
Solution:
Vulnerabilities:
Credit:
Ariko-Security
Maciej Gojny
[email protected]
tel.: +48512946012 (Mo-Fr 10.00-20.00 CET)