DotA OpenStats 'id' Parameter SQL Injection Vulnerability
BID:51110
Info
DotA OpenStats 'id' Parameter SQL Injection Vulnerability
| Bugtraq ID: | 51110 |
| Class: | Input Validation Error |
| CVE: |
CVE-2011-5218 |
| Remote: | Yes |
| Local: | No |
| Published: | Dec 19 2011 12:00AM |
| Updated: | Oct 29 2012 10:30AM |
| Credit: | HvM17 |
| Vulnerable: |
DotA OpenStats DotA OpenStats 1.3.9 |
| Not Vulnerable: | |
Discussion
DotA OpenStats 'id' Parameter SQL Injection Vulnerability
DotA OpenStats is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
A successful exploit will allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
DotA OpenStats 1.3.9 is vulnerable; prior versions may also be affected.
DotA OpenStats is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
A successful exploit will allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
DotA OpenStats 1.3.9 is vulnerable; prior versions may also be affected.
Exploit / POC
DotA OpenStats 'id' Parameter SQL Injection Vulnerability
Attackers can use a browser to exploit this issue.
The following example URL is available:
http://www.example.com/dotaStats/index.php?id='1 UNION SELECT 1,2,3,4
Attackers can use a browser to exploit this issue.
The following example URL is available:
http://www.example.com/dotaStats/index.php?id='1 UNION SELECT 1,2,3,4
Solution / Fix
DotA OpenStats 'id' Parameter SQL Injection Vulnerability
Solution:
Currently, we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently, we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
References
DotA OpenStats 'id' Parameter SQL Injection Vulnerability
References:
References:
- DotA OpenStats Download Page (DotA OpenStats)