header-logo
Suggest Exploit
vendor:
LiSK CMS
by:
High-Tech Bridge SA
6,5
CVSS
MEDIUM
SQL Injection
89
CWE
Product Name: LiSK CMS
Affected Version From: 4.4
Affected Version To: 4.4
Patch Exists: NO
Related CWE: N/A
CPE: a:createch-group:lisk_cms
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Browser
2010

SQL Injection Vulnerability in LiSK CMS

The vulnerability exists due to failure in the "/edit_email.php" script to properly sanitize user-supplied input in "id" variable. Attacker can alter queries to the application SQL database, execute arbitrary queries to the database, compromise the application, access or modify sensitive data, or exploit various vulnerabilities in the underlying SQL database. Attacker can use browser to exploit this vulnerability.

Mitigation:

Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being passed to the database.
Source

Exploit-DB raw data:

Vulnerability ID: HTB22373

Reference:
http://www.htbridge.ch/advisory/sql_injection_vulnerability_in_lisk_cms_1.html

Product: LiSK CMS

Vendor: Createch-group

Vulnerable Version: 4.4

Vendor Notification: 06 May 2010

Vulnerability Type: SQL Injection

Status: Not Fixed, Vendor Alerted, Awaiting Vendor Response Risk level:
Medium

Credit: High-Tech Bridge SA (http://www.htbridge.ch/)


Vulnerability Details:

The vulnerability exists due to failure in the "/edit_email.php" script to
properly sanitize user-supplied input in "id" variable. Attacker can alter
queries to the application SQL database, execute arbitrary queries to the
database, compromise the application, access or modify sensitive data, or
exploit various vulnerabilities in the underlying SQL database.


Attacker can use browser to exploit this vulnerability. The following PoC is
available:

http://host/path_to_cp/edit_email.php?&id=X%27+union+select+1,2,3,4,5,6+--+