vendor:
RSform!
by:
jdc
7,5
CVSS
HIGH
Local File Include and SQL Injection
22, 89
CWE
Product Name: RSform!
Affected Version From: 1.0.5
Affected Version To: 1.0.5
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2010
RSform! 1.0.5 (Joomla) Multiple Vulnerabilities
RSform! 1.0.5 (Joomla) is vulnerable to Local File Include and SQL Injection. The Local File Include vulnerability can be exploited by appending '?option=com_forme〈=../../../../../../../../../etc/passwd%00' to the URL. The SQL Injection vulnerability can be exploited by appending '?option=com_forme〈=-1' union select benchmark(1000000,md5(1)) -- ' to the URL. RSform! Pro is not affected.
Mitigation:
Ensure that user input is properly validated and sanitized before being used in SQL queries. Ensure that the application is not vulnerable to directory traversal attacks.