CGI Generic SQL Injection (blind, time based)
-
Hi,
We have received a PCI scan of our website and there are 2 items – CGI Generic SQL Injection (blind, time-based) and CGI Generic Local File Inclusion that made our report fail with a bit negative impact on us.
After looking into the report we found that this plugin is the caused of the vulnerabilities.
This is one of the flagged examples :Using the POST HTTP method, SecurityMetrics found that : + The
following resources may be vulnerable to local file inclusion : + The
'dgwt_wcas' parameter of the / CGI : / [dgwt_wcas=/%00.html] --------
output --------'home-banner') ); ?>If this something that you guys can address and this could affect more people
The page I need help with: [log in to see the link]
- You must be logged in to reply to this topic.