vendor:
MySQL File and Image Uploader and Sharing Blob File Server
by:
Özkan Mustafa Akkus (AkkuS)
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: MySQL File and Image Uploader and Sharing Blob File Server
Affected Version From: 1.7
Affected Version To: 1.7
Patch Exists: NO
Related CWE: N/A
CPE: a:codecanyon:mysql_file_and_image_uploader_and_sharing_blob_file_server
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Kali Linux
2018
MySQL Blob Uploader 1.7 – ‘home-filet-edit.php’ SQL Injection
The vulnerability exists due to insufficient sanitization of user-supplied input in the 'id' parameter of '/MySqlBlobUploader/home-filet-edit.php' script. A remote attacker can execute arbitrary SQL commands in application's database, cause denial of service, bypass certain security restrictions, access, modify or delete data. There are four types of SQL injection: boolean-based blind, error-based, AND/OR time-based blind and UNION query.
Mitigation:
Input validation should be used to prevent SQL injection attacks. The application should use parameterized queries (also known as prepared statements) when interacting with the database.