vendor:
IP Reg
by:
StAkeR
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: IP Reg
Affected Version From: 0.4
Affected Version To: 0.4
Patch Exists: NO
Related CWE: N/A
CPE: a:ip_reg:ip_reg
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: None
2008
IP Reg <= 0.4 Blind SQL Injection Exploit
IP Reg <= 0.4 is vulnerable to Blind SQL Injection. This exploit uses a benchmark method to extract the hash of the admin password. The exploit takes two arguments, the URL of the target and the user ID of the admin. The exploit then sends a request to the login.php page with a crafted SQL query. If the response time is greater than 3 seconds, it means that the query was successful and the character is appended to the hash. This process is repeated for all the characters of the hash.
Mitigation:
Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being used in SQL queries.