vendor:
phpAcounts
by:
loneferret
7,5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: phpAcounts
Affected Version From: 0.5.3
Affected Version To: 0.5.3
Patch Exists: NO
Related CWE: N/A
CPE: a:phpaccounts:phpaccounts:0.5.3
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Ubuntu Server 11.10
2012
Exploit phpAcounts v.0.5.3 SQL Injection
A vulnerability exists in phpAcounts v.0.5.3 which allows an attacker to bypass authentication and upload a malicious file. The letterhead image upload does not sanitize file extensions, allowing an attacker to upload a malicious file. The attacker can then access the shell by accessing the URL http://server/phpaccounts/users/1/<filename> and execute arbitrary commands.
Mitigation:
Ensure that all user input is properly sanitized and validated before being used in any SQL queries.