header-logo
Suggest Exploit
vendor:
4images
by:
SecurityFocus
7,5
CVSS
HIGH
Cross-Site Scripting, Open-Redirection, SQL-Injection
79,601,89
CWE
Product Name: 4images
Affected Version From: 1.7.10
Affected Version To: 1.7.10
Patch Exists: YES
Related CWE: N/A
CPE: 4images
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2012

4images Multiple Input-Validation Vulnerabilities

4images is prone to multiple input-validation vulnerabilities including cross-site scripting, open-redirection, and SQL-injection. An attacker may leverage these issues to perform spoofing and phishing attacks, to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database and execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site.

Mitigation:

Developers should ensure that user-supplied input is properly sanitized and validated before being used in the application. Additionally, developers should ensure that the application is not vulnerable to SQL injection attacks.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/51774/info
  
4images is prone to multiple input-validation vulnerabilities including:
  
1. A cross-site scripting vulnerability.
2. An open-redirection vulnerability.
3. An SQL-injection vulnerability.
  
An attacker may leverage these issues to perform spoofing and phishing attacks, to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database and execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site.
  
4images 1.7.10 is vulnerable; other versions may also be affected. 

http://www.example.com/admin/index.php?__csrf=931086345abbb83f9a70c87dc4719248& action=login&redirect=http://google.com&loginusername=admin&loginpassword=pass