vendor:
LightNEasy CMS
by:
Stephan Sattler
7,5
CVSS
HIGH
Blind SQL Injection
89
CWE
Product Name: LightNEasy CMS
Affected Version From: 3.2.1
Affected Version To: 3.2.1
Patch Exists: NO
Related CWE: N/A
CPE: a:lightneasy:lightneasy_cms
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2010
LightNEasy Cms 3.2.1 Blind SQL Injection Vulnerability
LightNEasy Cms 3.2.1 is vulnerable to Blind SQL Injection. The vulnerability exists due to the lack of sanitization of the $_POST['handle'] parameter before executing the database query. An attacker can exploit this vulnerability by sending a malicious URL with postdata containing a UNION SELECT statement with a BENCHMARK() function. This will trigger benchmark() if the first character of the admin hash is b.
Mitigation:
Input validation should be performed to ensure that untrusted data is not used to generate SQL queries that are executed against the database.