Triexa SonicMailer Pro Index.PHP SQL injection Vulnerability
BID:22920
Info
Triexa SonicMailer Pro Index.PHP SQL injection Vulnerability
| Bugtraq ID: | 22920 |
| Class: | Input Validation Error |
| CVE: |
CVE-2007-1425 |
| Remote: | Yes |
| Local: | No |
| Published: | Mar 11 2007 12:00AM |
| Updated: | May 12 2015 07:29PM |
| Credit: | ajann is credited with the discovery of this vulnerability. |
| Vulnerable: |
Triexa SonicMailer Pro 3.2.3 |
| Not Vulnerable: | |
Discussion
Triexa SonicMailer Pro Index.PHP SQL injection Vulnerability
Triexa SonicMailer Pro is prone to an SQL-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in an SQL query.
Exploiting this vulnerability could permit remote attackers to pass malicious input to database queries, resulting in the modification of query logic or other attacks.
SonicMailer Pro 3.2.3 and prior versions are reported affected by this issue.
Triexa SonicMailer Pro is prone to an SQL-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in an SQL query.
Exploiting this vulnerability could permit remote attackers to pass malicious input to database queries, resulting in the modification of query logic or other attacks.
SonicMailer Pro 3.2.3 and prior versions are reported affected by this issue.
Exploit / POC
Triexa SonicMailer Pro Index.PHP SQL injection Vulnerability
Attackers can use a browser to exploit this issue.
The following proof of concept is available:
Attackers can use a browser to exploit this issue.
The following proof of concept is available:
Solution / Fix
Triexa SonicMailer Pro Index.PHP SQL injection Vulnerability
Solution:
Currently we are not aware of any patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].