Gelato CMS Index.PHP SQL Injection Vulnerability
BID:25677
Info
Gelato CMS Index.PHP SQL Injection Vulnerability
| Bugtraq ID: | 25677 |
| Class: | Input Validation Error |
| CVE: |
CVE-2007-4918 |
| Remote: | Yes |
| Local: | No |
| Published: | Sep 14 2007 12:00AM |
| Updated: | May 07 2015 05:35PM |
| Credit: | s0cratex is credited with the discovery of this vulnerability. |
| Vulnerable: |
Jorge Condomí Gelato CMS 0.90 |
| Not Vulnerable: | |
Discussion
Gelato CMS Index.PHP SQL Injection Vulnerability
Gelato CMS is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
Gelato CMS is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
Exploit / POC
Gelato CMS Index.PHP SQL Injection Vulnerability
Attackers can use a browser to exploit this issue.
The following example exploit is available:
Attackers can use a browser to exploit this issue.
The following example exploit is available:
Solution / Fix
Gelato CMS Index.PHP SQL Injection Vulnerability
Solution:
The vendor released an update to address this issue. The update is available through the SVN and will be included in the next release. Please see the references for more information.
Jorge Condomí Gelato CMS 0.90
Solution:
The vendor released an update to address this issue. The update is available through the SVN and will be included in the next release. Please see the references for more information.
Jorge Condomí Gelato CMS 0.90
-
Jorge Condomí gelatoCMS_current
http://gelatocms.googlecode.com/svn/trunk/
References
Gelato CMS Index.PHP SQL Injection Vulnerability
References:
References:
- Gelato CMS Homepage (Jorge Condomí)
- Gelato SQL Injection exploit ([email protected])