vendor:
GeN3 Version 1.3
by:
Dr.0rYX & Cr3w-DZ
N/A
CVSS
N/A
SQL injection
N/A
CWE
Product Name: GeN3 Version 1.3
Affected Version From: 1.3
Affected Version To: 1.3
Patch Exists: N/A
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
N/A
GeN3 forum V1.3 SQL injection vulnerability
The vulnerability exists in the 'main_forum.php' file, which allows an attacker to inject malicious SQL queries via the 'cat' parameter. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. This can be done by sending an HTTP request with a malicious 'cat' parameter value, such as '-1+Union+ALL+Select+1,group_concat(aId,0x3a,aUsername,0x3a,apassword),3,4,5,6,7+FROM+admins--' or '-1+Union+ALL+Select+1,group_concat(mId,0x3a,mUsername,0x3a,mpassword),3,4,5,6,7+FROM+members--'
Mitigation:
The vendor should ensure that user-supplied input is properly sanitized and validated before being used in SQL queries.