vendor:
Zenphoto
by:
Silentz
7.5
CVSS
HIGH
SQL Injection
Not mentioned
CWE
Product Name: Zenphoto
Affected Version From: Zenphoto 1.1.3
Affected Version To: Not mentioned
Patch Exists: No
Related CWE: Not mentioned
CPE: Not mentioned
Platforms Tested: Not mentioned
Not mentioned
Zenphoto 1.1.3 SQL Injection Exploit
This exploit allows an attacker to retrieve the admin username and hash from the Zenphoto 1.1.3 application. The vulnerability exists in the 'rss.php' file, where the 'albumnr' parameter is not properly sanitized before being used in a SQL query. By injecting a UNION SELECT statement, the attacker can retrieve sensitive information from the database, such as the admin username and hash.
Mitigation:
To mitigate this vulnerability, it is recommended to sanitize user input before using it in SQL queries. Additionally, keeping the application up to date with the latest patches and security updates can help prevent such exploits.