Dream4 Koobi CMS Index.PHP SQL Injection Vulnerability
BID:12896
Info
Dream4 Koobi CMS Index.PHP SQL Injection Vulnerability
| Bugtraq ID: | 12896 |
| Class: | Input Validation Error |
| CVE: |
CVE-2005-0890 |
| Remote: | Yes |
| Local: | No |
| Published: | Mar 24 2005 12:00AM |
| Updated: | Jul 12 2009 11:56AM |
| Credit: | Discovery of this vulnerability is credited to mircia <[email protected]>. |
| Vulnerable: |
dream4 Koobi CMS 4.2.3 |
| Not Vulnerable: | |
Discussion
Dream4 Koobi CMS Index.PHP SQL Injection Vulnerability
Koobi CMS is reportedly affected by a SQL injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in as SQL query.
Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.
Koobi CMS is reportedly affected by a SQL injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in as SQL query.
Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.
Exploit / POC
Dream4 Koobi CMS Index.PHP SQL Injection Vulnerability
No exploit is required.
The following proof of concept URI is available:
http://www.example.com/index.php?p=articles&area=[SQL Code]
No exploit is required.
The following proof of concept URI is available:
http://www.example.com/index.php?p=articles&area=[SQL Code]
Solution / Fix
Dream4 Koobi CMS Index.PHP SQL Injection Vulnerability
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.