header-logo
Suggest Exploit
vendor:
Digital Attic Foundation CMS
by:
Unknown
8
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Digital Attic Foundation CMS
Affected Version From:
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:

Digital Attic Foundation CMS SQL Injection Vulnerability

The Digital Attic Foundation CMS is vulnerable to an SQL injection attack due to inadequate input sanitization. An attacker can manipulate the 'id' parameter in the 'index.php' page to inject malicious SQL code, potentially compromising the application, gaining unauthorized access to data, or exploiting other vulnerabilities in the underlying database.

Mitigation:

To mitigate this vulnerability, it is recommended to implement proper input validation and sanitization techniques. The application should use parameterized queries or prepared statements to prevent SQL injection attacks.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/50735/info

Digital Attic Foundation CMS is prone to an SQL-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in an SQL query.

A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database. 

http://www.example.com/index.php?id=[SQL]