e107 'view' Parameter SQL Injection Vulnerability
BID:52821
Info
e107 'view' Parameter SQL Injection Vulnerability
| Bugtraq ID: | 52821 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Mar 30 2012 12:00AM |
| Updated: | Mar 30 2012 12:00AM |
| Credit: | Am!r |
| Vulnerable: |
e107 e107 1.0 |
| Not Vulnerable: | |
Discussion
e107 'view' Parameter SQL Injection Vulnerability
e107 is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
e107 1.0.0 is vulnerable; other versions may also be affected.
e107 is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
e107 1.0.0 is vulnerable; other versions may also be affected.
Exploit / POC
e107 'view' Parameter SQL Injection Vulnerability
Attackers can use a browser to exploit this issue.
The following example URI is available:
http://www.example.com/index.php?option=com_flexicontent&view=[Sql]
Attackers can use a browser to exploit this issue.
The following example URI is available:
http://www.example.com/index.php?option=com_flexicontent&view=[Sql]
Solution / Fix
e107 'view' Parameter SQL Injection Vulnerability
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of any more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of any more recent information, please mail us at: [email protected].