Lucene search

K

phpwebsite0101.txt

๐Ÿ—“๏ธย 17 Aug 2005ย 00:00:00Reported byย matrix killerTypeย 
packetstorm
ย packetstorm
๐Ÿ”—ย packetstormsecurity.com๐Ÿ‘ย 28ย Views

phpWebSite 0.10.1 Full SQL Injection vulnerability, no vendor respons

Show more
Code
`TITLE:  
=====  
phpWebSite 0.10.1 Full SQL Injection  
  
SOFTWARE:  
==========  
phpWebSite 0.10.1 Full  
  
INFO:  
=====  
phpWebSite provides a complete web site content management system.  
  
DESCRIPTION:  
============  
phpWebSite 0.10.1 full is vulnerable to an sql injection attack. Here  
is an example:  
  
http://localhost/phpweb/index.php?module=[sql_injection]  
  
DB Error: syntax error  
SELECT show_block, block_title FROM mod_search WHERE  
module='[sql_injection]' [nativecode=1064 ** You have an error in your  
SQL syntax. Check the manual that corresponds to your MySQL server  
version for the right syntax to use near ''[sql_injection]'' at line  
1]  
  
PATCH:  
======  
A simple filter function will do or make the script to accept only  
a-b,A-B,0-9 characters  
  
VENDOR STATUS:  
===============  
The vendors were contacted but no response received.  
  
CREDITS:  
========  
This vulnerability was discovered and researched by   
matrix_killer of h4cky0u Security Forums.  
  
mail : matrix_k at abv.bg  
  
web : http://www.h4cky0u.org  
  
  
Greets to all omega-team members + krassswr,EcLiPsE and all who support us !!!  
  
===========  
  
http://h4cky0u.org/viewtopic.php?t=1967  
--   
http://www.h4cky0u.org  
(In)Security at its best...  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contactย us for a demo andย discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
17 Aug 2005 00:00Current
7.4High risk
Vulners AI Score7.4
28
.json
Report