header-logo
Suggest Exploit
vendor:
JBS 2.0 and JBSX
by:
SecurityFocus
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: JBS 2.0 and JBSX
Affected Version From: 2
Affected Version To: JBSX
Patch Exists: N/A
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

Multiple JiRo’s Products SQL Injection Vulnerabilities

Multiple JiRo's products are prone to multiple SQL-injection vulnerabilities because they fail to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting these issues could allow an attacker to compromise the applications, access or modify data, or exploit latent vulnerabilities in the underlying database. The following proof-of-concept login and password examples are available: admin 'or' '=' and password 'or' '='.

Mitigation:

Input validation should be used to ensure that untrusted data is not used to construct SQL queries in a way that would allow an attacker to modify the logic of the executed query.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/37045/info

Multiple JiRo's products are prone to multiple SQL-injection vulnerabilities because they fail to sufficiently sanitize user-supplied data before using it in an SQL query.

Exploiting these issues could allow an attacker to compromise the applications, access or modify data, or exploit latent vulnerabilities in the underlying database.

The following products are affected:

JBS 2.0
JBSX

Other products may also be affected.

The following proof-of-concept login and password examples are available:

admin 'or' '='
password 'or' '='