vendor:
Goople
by:
darkjoker
7.5
CVSS
HIGH
Blind SQL Injection
89
CWE
Product Name: Goople
Affected Version From: 1.8.2002
Affected Version To: 1.8.2002
Patch Exists: NO
Related CWE: N/A
CPE: a:goople:goople:1.8.2
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: PHP
2009
Goople <= 1.8.2 Blind SQL Injection Exploit
Goople <= 1.8.2 is vulnerable to Blind SQL Injection. This exploit uses a brute force attack to extract the username and password from the GoopleCMS_users_ table. The exploit sends a malicious POST request to the frontpage.php page with a crafted username and password. If the response time is greater than 4 seconds, it means the malicious payload was successful and the character is correct. The exploit then moves on to the next character in the key and continues the process until the username and password are extracted.
Mitigation:
Ensure that user input is properly sanitized and validated before being used in a SQL query.