vendor:
Mediatheka
by:
athos
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Mediatheka
Affected Version From: 4.2
Affected Version To: 4.2
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008
Mediatheka <= 4.2 Remote Blind SQL Injection Exploit
This exploit is used to gain access to the Mediatheka application by exploiting a blind SQL injection vulnerability. The exploit sends a request to the connection.php page with a crafted user parameter. If the response time is greater than 6 seconds, the exploit assumes that the crafted parameter was valid and prints the character corresponding to the ASCII code of the character in the password. This process is repeated for each character in the password.
Mitigation:
Input validation should be used to prevent SQL injection attacks. Additionally, the application should be configured to use parameterized queries.