header-logo
Suggest Exploit
vendor:
Newsletter Open Source
by:
L0rd CrusAd3r
7,5
CVSS
HIGH
SQL injection Vulnerability
89
CWE
Product Name: Newsletter Open Source
Affected Version From: 2.7.1
Affected Version To: 2.7.1
Patch Exists: NO
Related CWE: N/A
CPE: a:diggersolutions:newsletter_open_source
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2010

Diggersolutions Newsletter SQL injection Vulnerability

Newsletter Open Source is an ASP-based online newsletter application. Includes Admin Pak, a former commercial add-on for the application. Commercial Rich Text Editor has been stripped from the Admin Pak. An attacker can exploit this vulnerability by sending malicious SQL queries to the vulnerable parameter 'qid' in the URL. This can allow the attacker to gain access to sensitive information from the database.

Mitigation:

Input validation should be used to prevent malicious SQL queries from being sent to the vulnerable parameter. Access to the vulnerable parameter should be restricted.
Source

Exploit-DB raw data:

Author: L0rd CrusAd3r aka VSN [crusader_hmg@yahoo.com]
Exploit Title: Diggersolutions Newsletter SQL injection Vulnerability
Version:2.7.1
Vendor url:http://diggersolutions.com
Published: 2010-11-02
Thanx to:r0073r (inj3ct0r.com), Sid3^effects, MaYur, MA1201, Sonic, M4n0j,SeeMe, gunslinger, Th3 RDX.
Greetz to : Inj3ct0r Exploit DataBase (inj3ct0r.com)
Special Greetz: Topsecure.net,0xr00t.com,Andhrahackers.com
Shoutzz:- To all ICW & Inj3ct0r members.
.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~..~.~.~.~.~~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.
Description:

Newsletter Open Source is an ASP-based online newsletter application.
Includes Admin Pak, a former commercial add-on for the application.
Commercial Rich Text Editor has been stripped from the Admin Pak..
?
.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~..~.~.~.~.~~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.
Vulnerability:

*SQL injection Vulnerability*


DEMO URL :

http://server/article.asp?qid=[SQLi]

.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~..~.~.~.~.~~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.
.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~..~.~.~.~.~~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.
# 0day n0 m0re #
.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~..~.~.~.~.~~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.
.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~..~.~.~.~.~~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.

-- 
With R3gards,
L0rd CrusAd3r