header-logo
Suggest Exploit
vendor:
CGILua
by:
aceeeeeeeer
5.5
CVSS
MEDIUM
SQL Injection
89
CWE
Product Name: CGILua
Affected Version From: 1
Affected Version To: 3
Patch Exists: NO
Related CWE:
CPE: a:tecgraf:cgilua
Metasploit:
Other Scripts:
Platforms Tested: Windows
2013

CGILua SQL Injection

The CGILua application is vulnerable to SQL injection. An attacker can exploit this vulnerability by injecting SQL queries into the 'sid' parameter in the start.htm page.

Mitigation:

To mitigate this vulnerability, ensure that input validation and parameterized queries are implemented in the CGILua application.
Source

Exploit-DB raw data:

# Exploit Title: CGILua SQL Injection
# Google Dork: inurl:/cgilua.exe/sys/
# Vendor Homepage: https://web.tecgraf.puc-rio.br/cgilua/
# Version: < = 3.0
# Date: 09/12/2013
# Exploit Author: aceeeeeeeer
# Contact: http://www.twitter.com/aceeeeeeeer
# Tested on: Windows
####################################################################################
greetz: CrazyDuck - Synchr0N1ze - No\one - Kouback_TR_ - unknow_antisec -
elCorpse
Clandestine - MentorSec - Titio Vamp - LLL - Slayer Owner - masoqfellipe
####################################################################################

Exploit: /cgi/cgilua.exe/sys/start.htm?sid=[ SQLi ]

Demo: http://www.server.com/publique/cgi/cgilua.exe/sys/start.htm?sid=157