Quote:
|
Your scanner is unable tell if it is vulnerable or not, which is why it says it is "possibly" vulnerable to SQL injection attacks. If you look at the scripts you will see there is no place where user input is directly placed into a SQL statement. Thus, the scripts are not vulnerable to SQL injection.
|
^ Exactly. There is no possible SQL injection through those scripts, even using TamperData to manually edit the data in transit SQLi is blocked. There is however confirmed XSS in the input fields. If you put in code it is reflected back to the user. Although the type of XSS isn't even remotely high impact the code should probably be changed up a bit to provide better input sanitization (I would do it but I am a horrible coder).
Kudos on the scripts Abrasive.
Also, you can't rely to heavily on the output from vulnerability scanners as they tend to only test heuristics instead of actually trying the attack vector. Heuristic scanners are always prone to give out false positives. This is true of Acunetix, WebSecurify, W3AF, Arachni, Nessus, OpenVAS, etc. They are useful for giving you an idea of where a vulnerability may be present, but you always need to test it yourself before you can really know for sure.