WikLink 0.1.3 SQL Injection

2011-01-03T00:00:00
ID PACKETSTORM:97222
Type packetstorm
Reporter Aliaksandr Hartsuyeu
Modified 2011-01-03T00:00:00

Description

                                        
                                            `www.eVuln.com advisory:  
SQL Injection in WikLink  
Summary: http://evuln.com/vulns/170/summary.html   
Details: http://evuln.com/vulns/170/description.html   
  
-----------Summary-----------  
eVuln ID: EV0170  
Software: WikLink  
Vendor: n/a  
Version: 0.1.3  
Critical Level: medium  
Type: SQL Injection  
Status: Unpatched. No reply from developer(s)  
PoC: Available  
Solution: Not available  
Discovered by: Aliaksandr Hartsuyeu ( http://evuln.com/ )  
  
--------Description--------  
It is possible to inject arbitrary SQL query using "q" parameter in search.php script.  
Parameter "q" used in SQL query without any sanitation.  
  
Condition: magic_quotes: off  
  
--------PoC/Exploit--------  
  
SQL Injection PoC code.  
  
SQL Injection example: http://website/wiklink/search.php?q=aaa' or 'a'='a  
  
---------Solution----------  
Not available  
  
----------Credit-----------  
Vulnerability discovered by Aliaksandr Hartsuyeu  
http://evuln.com/code-analysis.html - web application source code analysis service  
`