High (Medium) | SQL Injection |
---|---|
Description | SQL injection may be possible. |
URL | https://test-target.domain.com/exx/javax.faces.resource%25/components.css.jsf?ln=primefaces&v=6.1 |
Method | GET |
Parameter | javax.faces.resource |
Attack | javax.faces.resource% |
Other information | The page results were successfully manipulated using the boolean conditions [javax.faces.resource%] and [javax.faces.resourceXYZABCDEFGHIJ] The parameter value being modified was NOT stripped from the HTML output for the purposes of the comparison Data was returned for the original parameter. The vulnerability was detected by successfully restricting the data originally returned, by manipulating the parameter |