vendor:
e107 Plugin BLOG Engine
by:
Virangar Security Team (Hadihadi)
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: e107 Plugin BLOG Engine
Affected Version From: e107 Plugin BLOG Engine v2.2
Affected Version To: e107 Plugin BLOG Engine v2.2
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009
e107 Plugin BLOG Engine v2.2 SQL Injection Exploit
This exploit allows an attacker to gain access to the admin credentials of the e107 Plugin BLOG Engine v2.2. The exploit is done by sending a malicious HTTP request to the vulnerable website, which contains a SQL injection payload. The payload is designed to extract the admin username and password from the e107_user table. The exploit was discovered by the Virangar Security Team in 2009.
Mitigation:
The best way to mitigate this vulnerability is to ensure that all user input is properly sanitized and validated before being used in any SQL queries.