vendor:
4images
by:
Ahmed Sultan
7,5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: 4images
Affected Version From: 1.7.13
Affected Version To: 1.7.13
Patch Exists: NO
Related CWE: N/A
CPE: 4images
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2016
4images <= 1.7.13 Sql Injection Exploit
4images is a powerful web-based image gallery management system. It is vulnerable to Sql injection flaw which can be escalated to new administrator add exploit. The vulnerable code is present in the file admin/validateimages.php, line 406. The input parameter orderby is not sanitized before being passed to the sql query which lead to sql injection flaw. The proof of concept is a GET request to the URL /lab/4images1.7.13/4images/admin/validateimages.php?action=validateimages&orderby=extractvalue(1,concat(0x7e,version()))&direction=ASC&limitnumber=10.
Mitigation:
Input validation should be done to prevent SQL injection attacks. Sanitize user input and use parameterized queries.