Description
PHP AddressBook 9.0.0.1 contains a time-based blind SQL injection vulnerability that allows remote attackers to manipulate database queries through the 'id' parameter. Attackers can inject crafted SQL statements with time delays to extract information by observing response times in the photo.php endpoint.
Problem types
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Product status
Credits
David Velazquez a.k.a. d4sh&r000
References
www.exploit-db.com/exploits/48416 (ExploitDB-48416)
sourceforge.net/projects/php-addressbook/ (SourceForge Product Page)
www.vulncheck.com/advisories/addressbook-id-sql-injection (VulnCheck Advisory: addressbook 9.0.0.1 - 'id' SQL Injection)