Lucene search

K
exploitdbAlexander FuchsEDB-ID:18293
HistoryDec 30, 2011 - 12:00 a.m.

Akiva WebBoard 8.x - SQL Injection

2011-12-3000:00:00
Alexander Fuchs
www.exploit-db.com
40

AI Score

7.4

Confidence

Low

# Exploit Title: Akiva Webboard 8.x SQL Injection + Plaintext Passwords 
in Profiles.
# Google Dork: " /Powered by WebBoard 8"/
# Date: 30.12.2011
# Author: Alexander Fuchs
# Software Link: http://www.akiva.com/default.asp?l=1&id=8
# Version: 8.x
# Tested on: Windows, Linux.
# CVE :  Nope.

It is possible to login as administrator with admin'-- as username and 
password.
You can now go in the  admin profil to look at the password which is in  
plaintext in html.

AI Score

7.4

Confidence

Low

Related for EDB-ID:18293