I am using acunetix to perform part of a security audit on an incoming website. The application is mainly developped with PHP and MySql.
All user input are escaped, but some input (url parameters mainly) remain partially unescaped : I can still send the '*' operator in the string parameter. Acunetix triggers an alert because of it :
Attack details
URL encoded POST input A was set to 417*1*1*1*1*1*1*
Tests performed:
648' => ERROR
648'' => ERROR
883*1*1* => ERROR
545*1*1*1*1 => OK
965*1*1*1*1* => ERROR
880*1*1*1*1*1*1 => OK
417*1*1*1*1*1*1* => ERROR
And I do not understand why it is considered a vulnerability : is the purpose to show that my input is not sufficiently escaped (no matter how actually exploitable the flaw), or is there a real hazard here? And in case there is : how do you exploit it?
*
is an operator and that uses two operands on each side to perform any arithmetic operation. So if you are using*
at the end then it will always gives you an error...